Vulnerability Description
The Java implementation of GraniteDS, version 3.1.1.GA, AMF3 deserializers derives class instances from java.io.Externalizable rather than the AMF3 specification's recommendation of flash.utils.IExternalizable. A remote attacker with the ability to spoof or control an RMI server connection may be able to send serialized Java objects that execute arbitrary code when deserialized.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Graniteds | Graniteds | 3.1.1 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/97382Third Party AdvisoryVDB Entry
- http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-executionThird Party Advisory
- https://codewhitesec.blogspot.com/2017/04/amf.htmlExploitThird Party Advisory
- https://www.kb.cert.org/vuls/id/307983Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/97382Third Party AdvisoryVDB Entry
- http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-executionThird Party Advisory
- https://codewhitesec.blogspot.com/2017/04/amf.htmlExploitThird Party Advisory
- https://www.kb.cert.org/vuls/id/307983Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2017-3199?
CVE-2017-3199 is a vulnerability with a CVSS score of 8.1 (HIGH). The Java implementation of GraniteDS, version 3.1.1.GA, AMF3 deserializers derives class instances from java.io.Externalizable rather than the AMF3 specification's recommendation of flash.utils.IExter...
How severe is CVE-2017-3199?
CVE-2017-3199 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-3199?
Check the references section above for vendor advisories and patch information. Affected products include: Graniteds Graniteds.