An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code.
Clients that expect to get server-side exceptions need to set the enabledForExceptions property to true in order to process serialized exception messages again.
For Debian 8 Jessie
, this problem has been fixed in version
3.1.3-7+deb8u1.
We recommend that you upgrade your libxmlrpc3-java packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS