Skip to main content

Log4j Vulnerability - What do you need to know?


Show first post

32 comments

LostInEther
  • Comes here often
  • 11 comments
  • December 15, 2021
marcofabbri wrote:

:warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning:

Nearly full list of whats vendor/products are affected:

https://github.com/NCSC-NL/log4shell/tree/main/software

 :warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning:

grazie Signore


MicoolPaul
Forum|alt.badge.img+23
  • Author
  • 2370 comments
  • December 18, 2021
JMeixner wrote:
marcofabbri wrote:

Unfortunately, there’s a new second CVE that’s need a new patch.

https://nvd.nist.gov/vuln/detail/CVE-2021-45046

Yes, log4j 2.16.0 is needed now. And who knows if this is the last issue :sunglasses:

Unfortunately this is getting worse. At first there was concern this would result in Denial of Service attacks, now the CVE severity is expected to be increased from 3.7 to around 9 as limited Remote Code Execution (RCE) has been discovered.


Nico Losschaert
Forum|alt.badge.img+12
  • On the path to Greatness
  • 681 comments
  • December 19, 2021

Great post @MicoolPaul ! It has been a hell of a week regarding this issue, to mitigate the infrastructure of the customers...


marcofabbri
Forum|alt.badge.img+13
  • On the path to Greatness
  • 990 comments
  • December 20, 2021

Not sure if helpful, but INE posted this video about how log4j is exploited and how can be mitigated (double patch, the only first still permit DOS)

 


MicoolPaul
Forum|alt.badge.img+23
  • Author
  • 2370 comments
  • December 20, 2021

Thanks for sharing @marcofabbri, the more people know; the better they can apply the right mitigations.

 

Upon further review the second patch can cause DOS and RCE, but RCE so far has only been proven via macOS it seems.


vNote42
Forum|alt.badge.img+13
  • On the path to Greatness
  • 1246 comments
  • December 20, 2021

VMware started to offer fixes for their VDI products:

https://www.vmware.com/security/advisories/VMSA-2021-0028.html

They also updated their workaround KB-article for the new finding, @MicoolPaul mentioned:

https://kb.vmware.com/s/article/87081. There is a new script to remove Java classes.


vNote42
Forum|alt.badge.img+13
  • On the path to Greatness
  • 1246 comments
  • December 22, 2021
vNote42 wrote:

If interested: Here is a list of all HPE products NOT affected:

https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00120086en_us

Here is a list of all affected HPE products and versions:

https://support.hpe.com/hpesc/public/docDisplay?nlaid=HPGL_ALERTS_3009925&docId=emr_na-hpesbgn04215en_us


Comment