Log4j2 vulnerability fix update DEC 2021 | log4j2 fix | log4j2 vulnerability | log4j2.17.0|okay java

preview_player
Показать описание
#log4j2 #log4j2-fix #log4j2-vulnerability-fix-update #log4j2vulnerabilityfixupdate #okayjava
Log4j2 vulnerability fix update 2021 | log4j2 fix | log4j2 vulnerability | log4j2.17.0 | okay java

Download the source code

FIX/Mitigation/Java6
Log4j1.x (if using jdbcAppender )
switch to Log4j2.3.1 (Java 6)

FIX/Mitigation/Java7
Apache Log4j 2.x to 2.16.0 ??
switch to Log4j2.12.3 (Java 7)

FIX/Mitigation/Java8
Apache Log4j 2.x to 2.16.0 ??
switch to Log4j2.17.0 (Java 8)

Download log2j2.17.0 jars

References

CVE-2021-44228
Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. 
this functionality has been completely removed From version 2.16.0.

CVE-2021-45046
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. 
Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.

CVE-2021-4104
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration.
Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender.
Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2.

CVE-2021-45105
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups.
This issue was fixed in Log4j 2.17.0 and 2.12.3.

log4j-zero-day-vulnerability
To simplify things, the current list of vulnerabilities and recommended fixes is listed here:
CVE-2021-44228 (CVSS score: 10.0) - A remote code execution vulnerability affecting Log4j versions from 2.0-beta9 to 2.14.1 (Fixed in version 2.15.0)
CVE-2021-45046 (CVSS score: 9.0) - An information leak and remote code execution vulnerability affecting Log4j versions from 2.0-beta9 to 2.15.0, excluding 2.12.2 (Fixed in version 2.16.0)
CVE-2021-45105 (CVSS score: 7.5) - A denial-of-service vulnerability affecting Log4j versions from 2.0-beta9 to 2.16.0 (Fixed in version 2.17.0)
CVE-2021-4104 (CVSS score: 8.1) - An untrusted deserialization flaw affecting Log4j version 1.2 (No fix available; Upgrade to version 2.17.0)
We recommend following the advice of Apache, which recommends updating to 2.17.0 immediately.

please subscribe okay java :)
Рекомендации по теме
Комментарии
Автор

There is file l. Jar how can I update this

k.vtechali
Автор

Could you make the log41 to log4j2 migration

rksingh
Автор

Hi I wanna know how to update to log4j2 2.17.1 on red hat linux 7 server? I have an application running

louisasdo
visit shbcf.ru