Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CACmp6kpcEne1tqKHK2Xbceeu9CFwqKE1ARhT_jMYRq=TNZYNcA@mail.gmail.com>
Date: Mon, 17 Apr 2017 10:17:28 -0500
From: Matt Sicker <mattsicker@...che.org>
To: dev@...ging.apache.org, security <security@...che.org>, 
	"Almeida De Macedo, Marcio" <Marcio.AlmeidaDeMacedo@...m.telstra.com>, oss-security@...ts.openwall.com, 
	bugtraq@...urityfocus.com
Subject: CVE-2017-5645: Apache Log4j socket receiver deserialization vulnerability

CVE-2017-5645: Apache Log4j socket receiver deserialization vulnerability

Severity: High

CVSS Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Vendor: The Apache Software Foundation

Versions Affected: all versions from 2.0-alpha1 to 2.8.1

Description: When using the TCP socket server or UDP socket server to
receive serialized log events from another application, a specially crafted
binary payload can be sent that, when deserialized, can execute arbitrary
code.

Mitigation: Java 7+ users should migrate to version 2.8.2 or avoid using
the socket server classes. Java 6 users should avoid using the TCP or UDP
socket server classes, or they can manually backport the security fix from
2.8.2: <https://git-wip-us.apache.org/repos/asf?p=logging-log4j2.
git;h=5dcc192>

Credit: This issue was discovered by Marcio Almeida de Macedo of Red Team
at Telstra

References: <https://issues.apache.org/jira/browse/LOG4J2-1863>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.