First published: Wed Nov 29 2023(Updated: )
A serialization vulnerability in logback receiver component part of logback version 1.4.11 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
Credit: vulnerability@ncsc.ch vulnerability@ncsc.ch
Affected Software | Affected Version | How to fix |
---|---|---|
Qos Logback | >=1.2.0<1.2.13 | |
Qos Logback | >=1.3.0<1.3.12 | |
Qos Logback | >=1.4.0<1.4.12 | |
maven/ch.qos.logback:logback-classic | <1.2.13 | 1.2.13 |
maven/ch.qos.logback:logback-core | <1.2.13 | 1.2.13 |
maven/ch.qos.logback:logback-core | >=1.3.0<1.3.12 | 1.3.12 |
maven/ch.qos.logback:logback-classic | >=1.3.0<1.3.12 | 1.3.12 |
maven/ch.qos.logback:logback-core | >=1.4.0<1.4.12 | 1.4.12 |
maven/ch.qos.logback:logback-classic | >=1.4.0<1.4.12 | 1.4.12 |
>=1.2.0<1.2.13 | ||
>=1.3.0<1.3.12 | ||
>=1.4.0<1.4.12 |
Only environments where logback receiver component is deployed may be vulnerable. In case a logback receiver is deployed, restricting connections to trustworthy clients or upgrading to logback version 1.4.12 or later will remedy the vulnerability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6378 is a serialization vulnerability in the logback receiver component, allowing an attacker to mount a Denial-of-Service attack by sending poisoned data.
CVE-2023-6378 has a severity level of 7.1, which is classified as high.
Logback versions 1.4.0 to 1.4.12 and versions 1.3.0 to 1.3.12 of logback-core and logback-classic are affected by CVE-2023-6378.
To fix CVE-2023-6378, upgrade to logback version 1.4.12 for logback-core and logback-classic.
You can find more information about CVE-2023-6378 in the logback news, the NIST vulnerability database, and the logback GitHub commit.