First published: Mon Jun 04 2018(Updated: )
Apache XML-RPC is a Java implementation of XML-RPC, a popular protocol that uses XML over HTTP to implement remote procedure calls.<br>Security Fix(es):<br><li> xmlrpc: Deserialization of untrusted Java object through <ex:serializable> tag (CVE-2016-5003)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-java-common-xmlrpc | <3.1.3-8.16.el7 | 3.1.3-8.16.el7 |
redhat/rh-java-common-xmlrpc-client | <3.1.3-8.16.el7 | 3.1.3-8.16.el7 |
redhat/rh-java-common-xmlrpc-common | <3.1.3-8.16.el7 | 3.1.3-8.16.el7 |
redhat/rh-java-common-xmlrpc-javadoc | <3.1.3-8.16.el7 | 3.1.3-8.16.el7 |
redhat/rh-java-common-xmlrpc-server | <3.1.3-8.16.el7 | 3.1.3-8.16.el7 |
redhat/rh-java-common-xmlrpc | <3.1.3-8.16.el6 | 3.1.3-8.16.el6 |
redhat/rh-java-common-xmlrpc-client | <3.1.3-8.16.el6 | 3.1.3-8.16.el6 |
redhat/rh-java-common-xmlrpc-common | <3.1.3-8.16.el6 | 3.1.3-8.16.el6 |
redhat/rh-java-common-xmlrpc-javadoc | <3.1.3-8.16.el6 | 3.1.3-8.16.el6 |
redhat/rh-java-common-xmlrpc-server | <3.1.3-8.16.el6 | 3.1.3-8.16.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2018:1784 is classified as moderate.
To fix RHSA-2018:1784, you should update to the package versions 3.1.3-8.16.el7 or 3.1.3-8.16.el6 as applicable.
RHSA-2018:1784 addresses CVE-2016-5003, which involves deserialization of untrusted Java objects.
RHSA-2018:1784 affects several packages including rh-java-common-xmlrpc, rh-java-common-xmlrpc-client, and rh-java-common-xmlrpc-server.
As of now, there are no specific known exploits publicly disclosed for RHSA-2018:1784.