[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2022-1562 --- log4j

ID: oval:org.secpod.oval:def:1601506Date: (C)2022-01-21   (M)2023-12-26
Class: PATCHFamily: unix




It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. A flaw was discovered in Log4j, where a vulnerable SocketServer class may lead to the deserialization of untrusted data. This flaw allows an attacker to remotely execute arbitrary code when combined with a deserialization gadget. A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSAppender in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if the deployed application is configured to use JMSAppender and to the attacker's JNDI LDAP endpoint

Platform:
Amazon Linux AMI
Product:
log4j
Reference:
ALAS-2022-1562
CVE-2017-5645
CVE-2019-17571
CVE-2021-4104
CVE    3
CVE-2021-4104
CVE-2017-5645
CVE-2019-17571

© SecPod Technologies