Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized object in a JMS ObjectMessage that is handled by the getObject function.
packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html
qpid.apache.org/components/jms/security-0-x.html
qpid.apache.org/components/jms/security.html
www.securityfocus.com/archive/1/538813/100/0/threaded
www.securityfocus.com/bid/91537
www.securitytracker.com/id/1036239
issues.apache.org/jira/browse/QPIDJMS-188