Lucene search

K
cve[email protected]CVE-2023-26464
HistoryMar 10, 2023 - 2:15 p.m.

CVE-2023-26464

2023-03-1014:15:10
CWE-502
web.nvd.nist.gov
132
log4j 1.x
chainsaw
socketappender
dos
cve-2023-26464
log4j 2.x
unsupported software

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

58.8%

UNSUPPORTED WHEN ASSIGNED

When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested)
hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized.

This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Affected configurations

Vulners
NVD
Node
apachelog4jRange2
CPENameOperatorVersion
apache:log4japache log4jlt2.0

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "Apache Log4j",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThan": "2",
        "status": "affected",
        "version": "1.0.4",
        "versionType": "maven"
      },
      {
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "version": "2",
        "versionType": "maven"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

58.8%