TROYANOSYVIRUS
Retour aux CVEs

CVE-2017-5645

CRITICAL
9.8

Description

In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie4/17/2017
Derniere modification4/20/2025
Sourcenvd
Observations honeypot0

Produits affectes

apache:log4jnetapp:oncommand_api_servicesnetapp:oncommand_insightnetapp:oncommand_workflow_automationnetapp:service_level_managernetapp:snapcenternetapp:storage_automation_storeoracle:api_gatewayoracle:application_testing_suiteoracle:autovue_vuelink_integrationoracle:banking_platformoracle:bi_publisheroracle:communications_converged_application_server_-_service_controlleroracle:communications_instant_messaging_serveroracle:communications_interactive_session_recorderoracle:communications_messaging_serveroracle:communications_network_integrityoracle:communications_online_mediation_controlleroracle:communications_pricing_design_centeroracle:communications_service_brokeroracle:communications_webrtc_session_controlleroracle:configuration_manageroracle:endeca_information_discovery_studiooracle:enterprise_data_qualityoracle:enterprise_manager_base_platformoracle:enterprise_manager_for_fusion_middlewareoracle:enterprise_manager_for_mysql_databaseoracle:enterprise_manager_for_oracle_databaseoracle:enterprise_manager_for_peoplesoftoracle:financial_services_analytical_applications_infrastructureoracle:financial_services_behavior_detection_platformoracle:financial_services_hedge_management_and_ifrs_valuationsoracle:financial_services_lending_and_leasingoracle:financial_services_loan_loss_forecasting_and_provisioningoracle:financial_services_profitability_managementoracle:financial_services_regulatory_reporting_with_agilereporteroracle:flexcube_investor_servicingoracle:fusion_middleware_mapvieweroracle:goldengateoracle:goldengate_application_adaptersoracle:identity_analyticsoracle:identity_management_suiteoracle:identity_manager_connectororacle:in-memory_performance-driven_planningoracle:instantis_enterprisetrackoracle:insurance_calculation_engineoracle:insurance_policy_administrationoracle:insurance_rules_paletteoracle:jd_edwards_enterpriseone_toolsoracle:jdeveloperoracle:mysql_enterprise_monitororacle:peoplesoft_enterprise_fin_installoracle:policy_automationoracle:policy_automation_connector_for_siebeloracle:policy_automation_for_mobile_devicesoracle:primavera_gatewayoracle:rapid_planningoracle:retail_advanced_inventory_planningoracle:retail_clearance_optimization_engineoracle:retail_extract_transform_and_loadoracle:retail_integration_busoracle:retail_open_commerce_platformoracle:retail_predictive_application_serveroracle:retail_service_backboneoracle:siebel_ui_frameworkoracle:soa_suiteoracle:tape_library_acslsoracle:timesten_in-memory_databaseoracle:utilities_advanced_spatial_and_operational_analyticsoracle:utilities_work_and_asset_managementoracle:weblogic_serverredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:fuse

Faiblesses (CWE)

CWE-502

References

http://www.openwall.com/lists/oss-security/2019/12/19/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/97702(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1040200(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1041294(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1417(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1801(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:1802(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2423(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2633(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2635(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2636(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2637(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2638(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2808(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2809(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2810(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2811(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2888(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:2889(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3244(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3399(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:3400(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1545(af854a3a-2127-422b-91ae-364da2661108)
https://issues.apache.org/jira/browse/LOG4J2-1863(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20180726-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20181107-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuApr2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2021.html(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.