DescriptionRed Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libcommons-collections3-java (PTS)wheezy, wheezy (security)3.2.1-5+deb7u1fixed
jessie (security), jessie3.2.1-7+deb8u1fixed
buster, sid, stretch3.2.2-1fixed
libcommons-collections4-java (PTS)jessie4.0-1vulnerable
buster, sid, stretch4.1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


workaround entry to associate the squeeze-lts, wheezy- and jessie-security fixes with the
corresponding entry with unstable and the hardening change.
severity unimportant since this is a hardening change, actual vulnerability relies in specific
No CVE is expected to be assigned, cf
Patches for 3.2.x:
Patches for 4.x:

Search for package or bug name: Reporting problems