Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.6.0+dfsg-1+deb7u2build0.14.04.1", "binary_name": "activemq" }, { "binary_version": "5.6.0+dfsg-1+deb7u2build0.14.04.1", "binary_name": "libactivemq-java" }, { "binary_version": "5.6.0+dfsg-1+deb7u2build0.14.04.1", "binary_name": "libactivemq-java-doc" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.13.2+dfsg-2", "binary_name": "activemq" }, { "binary_version": "5.13.2+dfsg-2", "binary_name": "libactivemq-java" }, { "binary_version": "5.13.2+dfsg-2", "binary_name": "libactivemq-java-doc" } ] }