The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-1777 from the MITRE CVE dictionary dictionary and NIST NVD.
Not affected. This flaw does not affect Apache Geronimo as shipped with various Red Hat products, as the affected subsystem is not included in these products.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 5.1 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | java-1.7.0-openjdk | Not affected |
Red Hat Enterprise Linux 6 | geronimo-specs | Not affected |
Red Hat Enterprise Linux 6 | mx4j | Not affected |
Red Hat Enterprise Linux 6 | java-1.7.0-openjdk | Not affected |
Red Hat Enterprise Linux 5 | java-1.7.0-openjdk | Not affected |
Red Hat Enterprise Linux 5 | geronimo-specs | Not affected |
Red Hat Enterprise Linux 5 | mx4j | Not affected |