First published: Tue Apr 11 2017(Updated: )
The EjbObjectInputStream class in Apache TomEE before 1.7.4 and 7.x before 7.0.0-M3 allows remote attackers to execute arbitrary code via a crafted serialized object.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache TomEE | <=1.7.3 | |
Apache TomEE | =7.0.0-m1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0779 is considered a critical vulnerability as it allows remote code execution through crafted serialized objects.
To fix CVE-2016-0779, upgrade Apache TomEE to version 1.7.4 or 7.0.0-M3 or later.
CVE-2016-0779 affects users of Apache TomEE versions prior to 1.7.4 and specific 7.x versions before 7.0.0-M3.
The impact of CVE-2016-0779 includes unauthorized remote access and execution of arbitrary code, potentially compromising system integrity.
Apache TomEE versions 1.7.3 and earlier, as well as 7.0.0-M1, are vulnerable to CVE-2016-0779.