Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5645

Опубликовано: 17 апр. 2017
Источник: debian
EPSS Критический

Описание

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache-log4j2fixed2.7-2package
apache-log4j2ignoredjessiepackage

Примечания

  • https://issues.apache.org/jira/browse/LOG4J2-1863

  • Fixed by: https://git-wip-us.apache.org/repos/asf?p=logging-log4j2.git;h=5dcc19215827db29c993d0305ee2b0d8dd05939d

EPSS

Процентиль: 100%
0.94013
Критический

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

CVSS3: 8.1
redhat
около 8 лет назад

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

CVSS3: 9.8
nvd
около 8 лет назад

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

CVSS3: 9.8
github
больше 5 лет назад

Deserialization of Untrusted Data in Log4j

oracle-oval
почти 8 лет назад

ELSA-2017-2423: log4j security update (IMPORTANT)

EPSS

Процентиль: 100%
0.94013
Критический