The hotrod java client in infinispan before 9.1.0.Final automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101910 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:3244 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:0501 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0750 | Issue Tracking Vendor Advisory |
https://github.com/infinispan/infinispan/pull/5116 | Patch Vendor Advisory |
https://issues.jboss.org/browse/ISPN-7781 | Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2018-09-11T13:00:00
Updated: 2018-09-12T09:57:01
Reserved: 2015-12-16T00:00:00
Link: CVE-2016-0750
JSON object: View
NVD Information
Status : Modified
Published: 2018-09-11T13:29:00.433
Modified: 2023-11-07T02:29:20.863
Link: CVE-2016-0750
JSON object: View
Redhat Information
No data.