Correction: Log4j versions up to 1.2.17 are affected. The ".27" was a typo.

On Wed, 18 Dec 2019 at 21:20, Matt Sicker <mattsic...@apache.org> wrote:
>
> CVE-2019-17571: Deserialization of untrusted data in SocketServer
>
> Severity: Critical
> CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/RL:W
>
> Product:
> Apache Log4j
>
> Versions Affected:
> Apache Log4j up to and including 1.2.27. Separately fixed by
> CVE-2017-5645 in Log4j 2.8.2.
>
> Problem type:
> CWE-502: Deserialization of Untrusted Data
>
> Description:
>
> Included in Log4j 1.2 is a SocketServer class that is vulnerable to
> deserialization of untrusted data which can be exploited to remotely
> execute arbitrary code when combined with a deserialization gadget
> when listening to untrusted network traffic for log data.
>
> Mitigation:
>
> Apache Log4j 1.2 reached end of life in August 2015. Users should
> upgrade to Log4j 2.x which both addresses that vulnerability as well
> as numerous other issues in the previous versions.
>
> Credit:
>
> This issue was initially discovered in CVE-2017-5645 by Marcio Almeida
> de Macedo of Red Team at Telstra.
>
> Links:
>
> https://logging.apache.org/log4j/1.2/
> https://issues.apache.org/jira/browse/LOG4J2-1863
>
> --
> Matt Sicker
> Secretary, Apache Software Foundation
> VP Logging Services, ASF



-- 
Matt Sicker
Secretary, Apache Software Foundation
VP Logging Services, ASF

Reply via email to