BDU:2021-05969

Scores

EPSS

0.000None0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

10.0Critical3.x
0246810

CVSS Score: 10.0/10

All CVSS Scores

CVSS 3.x
10.0

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

Уязвимость компонента JNDI библиотеки журналирования Java-программ Apache Log4j2 связана с недостаточной проверкой вводимых данных. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить произвольный код

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

bdu

Related Vulnerabilities

Recommendations

Source: bdu

Использование рекомендаций:
Для Apache Log4j2:
https://logging.apache.org/log4j/2.x/security.html

Для программных продуктов Cisco Systems Inc.:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd

Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/CVE-2021-44228

Для программных продуктов SonicWall:
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032

Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2021-44228

Для программных продуктов NetApp Inc.:
https://security.netapp.com/advisory/ntap-20211210-0007/

Для программных продуктов Juniper Networks Inc.:
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&cat=SIRT_1&actp=LIST

Для программных продуктов Siemens AG:
https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf

Для программных продуктов Dell Inc.:
https://www.dell.com/support/kbdoc/ru-ru/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability

Для РедОС:
http://repo.red-soft.ru/redos/7.2c/x86_64/updates/

Для программных продуктов Microsoft Corp.:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-44228

Для UBLinux:
https://security.ublinux.ru/AVG-45

Для ОС ОН «Стрелец»:

https://strelets.net/patchi-i-obnovleniya-bezopasnosti#kumulyativnoe-obnovlenie

Для ОСОН Основа:
Обновление программного обеспечения apache-log4j2 до версии 2.17.0+repack-1~deb10u1.osnova1

Для ОС ОН «Стрелец»:
Обновление программного обеспечения apache-log4j2 до версии 2.12.4-0+deb9u1

URL: https://bdu.fstec.ru/vul/2021-05969

Vulnerable Software (928)

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: debian gnu/linux 9

Trait:
{
  "version_end_excluding": "2.12.3"
}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: ublinux *

Trait:
{
  "version_end_excluding": "2.12.3"
}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: debian gnu/linux 11

Trait:
{
  "version_end_excluding": "2.3.1"
}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: осон основа оnyx *

Trait:
{
  "version_end_excluding": "2.12.3"
}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: осон основа оnyx *

Trait:
{
  "version_end_excluding": "2.17.0"
}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: осон основа оnyx *

Trait:
{
  "version_end_excluding": "2.3.1"
}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: debian gnu/linux 11

Trait:
{
  "version_end_excluding": "2.17.0"
}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: ublinux *

Trait:
{
  "version_end_excluding": "2.17.0"
}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: ublinux *

Trait:
{
  "version_end_excluding": "2.3.1"
}

Source: bdu

Type: Configuration

Vendor: apache software foundation

Product: log4j

Operating System: strelets *

Trait:
{
  "version_end_excluding": "2.12.3"
}

Source: bdu