Lucene search

K
broadcomBroadcom Security ResponseBSA-2021-1658
HistoryDec 30, 2021 - 12:00 a.m.

BSA-2021-1658

2021-12-3000:00:00
Broadcom Security Response
support.broadcom.com
13

8 High

AI Score

Confidence

High

0.022 Low

EPSS

Percentile

89.4%

Security Advisory ID : BSA-2021-1658

Component : JDBC Appender in Apache Log4j

Revision : 1.0


Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

More information is available at the link below.
Apache :<https://logging.apache.org/log4j/2.x/security.html&gt;** **
Brocade has investigated its product line to determine the exposure of Brocade Fibre Channel products from Broadcom.