First published: Tue Jan 18 2022(Updated: )
It was discovered that the ObjectInputStream class implementation in the Serialization component of OpenJDK did not check superclasses against the deserialization filter (defined via jdk.serialFilter system or security property) in cases when those classes were available locally and not included in the serialized stream. A specially-crafted serialized stream could possibly use this flaw to bypass class deserialization restrictions.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2041801 is classified as critical due to the potential for remote code execution through deserialization vulnerabilities.
To fix REDHAT-BUG-2041801, update to the latest version of OpenJDK which contains patches addressing the vulnerability.
REDHAT-BUG-2041801 specifically impacts Oracle OpenJDK versions that are vulnerable to the deserialization issue.
The risks of REDHAT-BUG-2041801 include potential unauthorized access and execution of malicious code on a system that utilizes vulnerable serialization mechanisms.
Yes, REDHAT-BUG-2041801 can potentially be exploited without authentication, allowing attackers to execute code remotely.