Alvaro Muatoz, Matthias Kaiser and Christian Schneider reports:
	  JMS Object messages depends on Java Serialization for
	    marshaling/unmashaling of the message payload. There are a couple of places
	    inside the broker where deserialization can occur, like web console or stomp
	    object message transformation. As deserialization of untrusted data can lead to
	    security flaws as demonstrated in various reports, this leaves the broker
	    vulnerable to this attack vector. Additionally, applications that consume
	    ObjectMessage type of messages can be vulnerable as they deserialize objects on
	    ObjectMessage.getObject() calls.