First published: Fri Mar 10 2023(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested) hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized. This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Log4j | >=1.0.4<2.0 | |
maven/org.apache.logging.log4j:log4j-core | >=1.0.4<2.0 | 2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26464 is a vulnerability that affects the Chainsaw or SocketAppender components in Log4j 1.x, allowing an attacker to cause a logging entry involving a specially-crafted hashmap or hashtable to be executed.
The Log4j 1.x version up to and including 1.0.4, and Log4j 2.0.0 are affected by CVE-2023-26464.
CVE-2023-26464 has a severity rating of 7.5 (High).
To fix CVE-2023-26464, upgrade to Log4j version 2.0.0 or above.
You can find more information about CVE-2023-26464 on the NIST National Vulnerability Database (NVD) and Apache mailing lists.