Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-5645

Опубликовано: 17 апр. 2017
Источник: ubuntu
Приоритет: medium
EPSS Критический
CVSS2: 7.5
CVSS3: 9.8

Описание

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

2.10.0-2
cosmic

not-affected

2.10.0-2
devel

not-affected

2.10.0-2
disco

not-affected

2.10.0-2
eoan

not-affected

2.10.0-2
esm-apps/bionic

not-affected

2.10.0-2
esm-apps/focal

not-affected

2.10.0-2
esm-apps/jammy

not-affected

2.10.0-2
esm-apps/noble

not-affected

2.10.0-2

Показывать по

EPSS

Процентиль: 100%
0.94013
Критический

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.1
redhat
около 8 лет назад

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

CVSS3: 9.8
nvd
около 8 лет назад

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

CVSS3: 9.8
debian
около 8 лет назад

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or ...

CVSS3: 9.8
github
больше 5 лет назад

Deserialization of Untrusted Data in Log4j

oracle-oval
почти 8 лет назад

ELSA-2017-2423: log4j security update (IMPORTANT)

EPSS

Процентиль: 100%
0.94013
Критический

7.5 High

CVSS2

9.8 Critical

CVSS3