This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Apache Log4j. Authentication is not required to exploit this vulnerability. The specific flaw exists within the StrSubstitutor class. The issue results from the lack of proper validation of user-supplied data, which can result in a resource exhaustion condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the process.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Log4j |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-16160 is critical due to its ability to enable remote denial-of-service attacks.
To fix ZDI-CAN-16160, update the Apache Log4j to the latest version that addresses this vulnerability.
ZDI-CAN-16160 affects all installations of Apache Log4j that utilize the StrSubstitutor class.
No, authentication is not required to exploit ZDI-CAN-16160, making it particularly dangerous.
The potential impact of ZDI-CAN-16160 includes causing a denial-of-service condition leading to application downtime.