Security Bulletin: WebSphere Application Server Community Edition 22.214.171.124 RMI classloader exposure
A problem in the RMI classloader may enable an attacker to send a serializated object via JMX that could compromise the system.
A specially crafted serialized object sent via the JMX connector could compromise the system due to a misconfigured RMI classloader.
CVEID : CVE-2013-1777
CVSS Base Score : 10
CVSS Temporal Score : See http://xforce.iss.net/xforce/xfdb/82268 for the current score
CVSS Environmental Score *: Undefined
CVSS Vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Affected Products And Versions
WebSphere Application Server Community Edition 126.96.36.199
Upgrade WebSphere Application Server Community Edition server to version 188.8.131.52.
Or follow the instruction bellow to fix this issue in WebSphere Application Server Community Edition 184.108.40.206.
1. Download the patch file:JMXConnecterPatch.zip
2. Unzip the attached file into the WebSphere Application Server Community Edition installation directory, and ensure the files listed in the zip file to replace the ones in the server installation.
3. Start the server with the cache cleaned, for example,
To prevent remote exploits hide the naming(1099) and JMX(9999) ports behind a firewall or bind them to a local network interface.
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY
More support for:
WebSphere Application Server Community Edition
Software version: 220.127.116.11
Operating system(s): AIX, Linux, Solaris, Windows
Software edition: Elite, Enhanced, Entry
Reference #: 1643282
Modified date: 2014-07-09