CVE-2016-0779
Severity CVSS v4.0:
Pending analysis
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
11/04/2017
Last modified:
20/04/2025
Description
The EjbObjectInputStream class in Apache TomEE before 1.7.4 and 7.x before 7.0.0-M3 allows remote attackers to execute arbitrary code via a crafted serialized object.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apache:tomee:*:*:*:*:*:*:*:* | 1.7.3 (including) | |
cpe:2.3:a:apache:tomee:7.0.0:m1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/136256/Apache-TomEE-Patched.html
- http://tomee-openejb.979440.n4.nabble.com/Document-resolved-vulnerability-CVE-2015-8581-td4678073.html
- http://tomee.apache.org/security/tomee.html
- http://www.securityfocus.com/archive/1/537806/100/0/threaded
- http://www.securityfocus.com/bid/79204
- http://www.zerodayinitiative.com/advisories/ZDI-15-638
- http://packetstormsecurity.com/files/136256/Apache-TomEE-Patched.html
- http://tomee-openejb.979440.n4.nabble.com/Document-resolved-vulnerability-CVE-2015-8581-td4678073.html
- http://tomee.apache.org/security/tomee.html
- http://www.securityfocus.com/archive/1/537806/100/0/threaded
- http://www.securityfocus.com/bid/79204
- http://www.zerodayinitiative.com/advisories/ZDI-15-638