Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2016-4974
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-13 Jul, 2016 | 15:59
Updated At-12 Apr, 2025 | 10:46

Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.5HIGH
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.06.0MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
Type: Primary
Version: 3.0
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 6.0
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:S/C:P/I:P/A:P
CPE Matches

The Apache Software Foundation
apache
>>amqp_0-x_jms_client>>Versions up to 6.0.3(inclusive)
cpe:2.3:a:apache:amqp_0-x_jms_client:*:*:*:*:*:*:*:*
The Apache Software Foundation
apache
>>jms_client_amqp>>Versions up to 0.9.0(inclusive)
cpe:2.3:a:apache:jms_client_amqp:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.htmlsecalert@redhat.com
Third Party Advisory
VDB Entry
http://qpid.apache.org/components/jms/security-0-x.htmlsecalert@redhat.com
Vendor Advisory
http://qpid.apache.org/components/jms/security.htmlsecalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/archive/1/538813/100/0/threadedsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/91537secalert@redhat.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1036239secalert@redhat.com
Third Party Advisory
VDB Entry
https://issues.apache.org/jira/browse/QPIDJMS-188secalert@redhat.com
Issue Tracking
http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://qpid.apache.org/components/jms/security-0-x.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://qpid.apache.org/components/jms/security.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/538813/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/91537af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1036239af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://issues.apache.org/jira/browse/QPIDJMS-188af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Hyperlink: http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://qpid.apache.org/components/jms/security-0-x.html
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://qpid.apache.org/components/jms/security.html
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/archive/1/538813/100/0/threaded
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/91537
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1036239
Source: secalert@redhat.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://issues.apache.org/jira/browse/QPIDJMS-188
Source: secalert@redhat.com
Resource:
Issue Tracking
Hyperlink: http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://qpid.apache.org/components/jms/security-0-x.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://qpid.apache.org/components/jms/security.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/archive/1/538813/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/91537
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1036239
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://issues.apache.org/jira/browse/QPIDJMS-188
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Change History
0Changes found

Details not found