Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 8 Nov 2016 08:49:09 +0700
From: Maxim Solodovnik <solomax@...che.org>
To: security@...nmeetings.apache.org, Brian Martin <bmartin@...able.com>, 
	oss-security@...ts.openwall.com, bugtraq@...urityfocus.com, 
	dev <dev@...nmeetings.apache.org>, 
	Openmeetings user-list <user@...nmeetings.apache.org>, user-russian@...nmeetings.apache.org, 
	announce@...che.org
Subject: [CVE-2016-8736] Apache Openmeetings RMI Registry Java Deserialization RCE

Severity: Moderate

Vendor: The Apache Software Foundation

Versions Affected: Apache OpenMeetings 3.1.0

Description: Apache Openmeetings is vulnerable to Remote Code
Execution via RMI deserialization attack

The issue was fixed in 3.1.2
All users are recommended to upgrade to Apache OpenMeetings 3.1.3

Credit: This issue was identified by Jacob Baines, Tenable Network Security


Apache OpenMeetings Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ