A misconfigured RMI classloader in Apache Geronimo 3.0 may enable an attacker to
send a serialized object via JMX that could compromise the system.
Geronimo 3.0, Beta 1 or M1 users are strongly encouraged to upgrade to
Remote exploits can be prevented by hiding the naming (1099) and JMX
behind a firewall or binding the ports to a local network interface.
This issue was discovered by Pierre Ernst of IBM Canada Ltd.