First published: Fri Oct 07 2016(Updated: )
JBoss EAP 4 and 5 JMX servlet is exposed on port 8080/TCP with authentication by default. The communication employs serialized Java objects, encapsulated in HTTP requests and responses. The server deserializes these objects. This behavior can be exploited to cause a denial of service and potentially execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform | >=4.0<6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1382534 is considered high as it can lead to a denial of service.
To fix REDHAT-BUG-1382534, upgrade to a version of JBoss EAP that is beyond 6.0.
REDHAT-BUG-1382534 affects Red Hat JBoss EAP versions 4.0 through 6.0.
Yes, REDHAT-BUG-1382534 can potentially be exploited remotely due to the JMX servlet exposed on port 8080.
REDHAT-BUG-1382534 can facilitate denial of service attacks through the deserialization of malicious Java objects.