From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-201607-17.xml | 54 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 54 insertions(+) create mode 100644 metadata/glsa/glsa-201607-17.xml (limited to 'metadata/glsa/glsa-201607-17.xml') diff --git a/metadata/glsa/glsa-201607-17.xml b/metadata/glsa/glsa-201607-17.xml new file mode 100644 index 000000000000..2a41ef9447f8 --- /dev/null +++ b/metadata/glsa/glsa-201607-17.xml @@ -0,0 +1,54 @@ + + + + BeanShell: Arbitrary code execution + BeanShell is vulnerable to the remote execution of arbitrary code + via Java serialization or XStream from an untrusted source. + + + 2016-07-30 + 2016-07-30: 1 + 575482 + remote + + + 2.0_beta6 + 2.0_beta6 + + + +

BeanShell is a small, free, embeddable Java source interpreter with + object scripting language features, written in Java. +

+
+ +

An application that includes BeanShell on the classpath may be + vulnerable if another part of the application uses Java serialization or + XStream to deserialize data from an untrusted source. +

+
+ +

Remote attackers could execute arbitrary code including shell commands.

+
+ +

There is no known workaround at this time.

+
+ +

All BeanShell users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --verbose --oneshot ">=dev-java/bsh-2.0_beta6" + +
+ + + BeanShell 2.0b6 Release Information + + + CVE-2016-2510 + + + b-man + b-man +
-- cgit v1.2.3