The EjbObjectInputStream class in Apache TomEE before 1.7.4 and 7.x before 7.0.0-M3 allows remote attackers to execute arbitrary code via a crafted serialized object.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/79204 | vdb entry third party advisory |
http://packetstormsecurity.com/files/136256/Apache-TomEE-Patched.html | vdb entry third party advisory |
http://tomee-openejb.979440.n4.nabble.com/Document-resolved-vulnerability-CVE-2015-8581-td4678073.html | issue tracking mailing list |
http://www.securityfocus.com/archive/1/537806/100/0/threaded | mailing list |
http://www.zerodayinitiative.com/advisories/ZDI-15-638 | vdb entry third party advisory |
http://tomee.apache.org/security/tomee.html | patch vendor advisory |