First published: Thu Jun 08 2017(Updated: )
Log4j is a tool to help the programmer output log statements to a variety of output targets.<br>Security Fix(es):<br><li> It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-java-common-log4j | <1.2.17-15.15.el7 | 1.2.17-15.15.el7 |
redhat/rh-java-common-log4j | <1.2.17-15.15.el7 | 1.2.17-15.15.el7 |
redhat/rh-java-common-log4j-javadoc | <1.2.17-15.15.el7 | 1.2.17-15.15.el7 |
redhat/rh-java-common-log4j-manual | <1.2.17-15.15.el7 | 1.2.17-15.15.el7 |
redhat/rh-java-common-log4j | <1.2.17-15.15.el6 | 1.2.17-15.15.el6 |
redhat/rh-java-common-log4j | <1.2.17-15.15.el6 | 1.2.17-15.15.el6 |
redhat/rh-java-common-log4j-javadoc | <1.2.17-15.15.el6 | 1.2.17-15.15.el6 |
redhat/rh-java-common-log4j-manual | <1.2.17-15.15.el6 | 1.2.17-15.15.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2017:1417 is classified as important.
To fix RHSA-2017:1417, upgrade to the version 1.2.17-15.15.el7 or 1.2.17-15.15.el6 of the affected packages.
RHSA-2017:1417 addresses a vulnerability in log4j's handling of remote logging that could allow an attacker to execute code.
The affected packages include rh-java-common-log4j, rh-java-common-log4j-javadoc, and rh-java-common-log4j-manual across different versions.
It is recommended to disable remote logging as a temporary workaround for RHSA-2017:1417.