First published: Fri May 06 2016(Updated: )
JBoss Operations Network server deserializes data, and does not require authentication. A malicious payload could be crafted, and sent to a server which when deserialized causes remote code execution.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Operations Network | <=3.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3737 is rated as critical due to its potential for remote code execution.
To fix CVE-2016-3737, upgrade to Red Hat JBoss Operations Network version 3.3.6 or later.
CVE-2016-3737 allows remote attackers to send malicious payloads for remote code execution through deserialization.
JBoss Operations Network versions prior to 3.3.6, specifically up to version 3.3.5, are affected by CVE-2016-3737.
CVE-2016-3737 does not require authentication, making it easier for attackers to exploit.