Description
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
Published: 2017-04-17
Score: 9.8 Critical
EPSS: 94.0% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fxph-q3j8-mv87 Deserialization of Untrusted Data in Log4j
References
Link Providers
http://www.openwall.com/lists/oss-security/2019/12/19/2 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html cve-icon cve-icon
http://www.securityfocus.com/bid/97702 cve-icon cve-icon
http://www.securitytracker.com/id/1040200 cve-icon cve-icon
http://www.securitytracker.com/id/1041294 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1417 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1801 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1802 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2423 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2633 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2635 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2636 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2637 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2638 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2808 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2809 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2810 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2811 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2888 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2889 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:3244 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:3399 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:3400 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1545 cve-icon cve-icon
https://issues.apache.org/jira/browse/LOG4J2-1863 cve-icon cve-icon
https://lists.apache.org/thread.html/0dcca05274d20ef2d72584edcf8c917bbb13dbbd7eb35cae909d02e9%40%3Cdev.logging.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1%40%3Cdev.tika.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c%40%3Cdev.tika.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6%40%3Cdev.tika.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/84cc4266238e057b95eb95dfd8b29d46a2592e7672c12c92f68b2917%40%3Cannounce.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/e8fb7d76a244ee997ba4b217d6171227f7c2521af8c7c5b16cba27bc%40%3Cdev.logging.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r0831e2e52a390758ce39a6193f82c11c295175adce6e6307de28c287%40%3Cissues.beam.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r23369fd603eb6d62d3b883a0a28d12052dcbd1d6d531137124cd7f83%40%3Cgithub.beam.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8%40%3Cdev.tika.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad%40%3Cdev.tika.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1%40%3Cdev.tika.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5%40%3Cdev.tika.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r94b5aae09c4bcff5d06cf641be17b00bd83ba7e10cad737bf16a1b8f%40%3Cgithub.beam.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9d5c1b558a15d374bd5abd2d3ae3ca7e50e796a0efdcf91e9c5b4cdd%40%3Cgithub.beam.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60%40%3Cdev.tika.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ra9a682bc0a8dff1c5cefdef31c7c25f096d9121207cf2d74e2fc563d%40%3Ccommits.logging.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rbfa7a0742be4981a3f9356a23d0e1a5f2e1eabde32a1a3d8e41420f8%40%3Cgithub.beam.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7%40%3Cdev.tika.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2%40%3Cdev.tika.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rcbb79023a7c8494cb389cd3d95420fa9e0d531ece0b780b8c1f99422%40%3Ccommits.doris.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rdbd579dc223f06af826d7de340218ee2f80d8b43fa7e4decb2a63f44%40%3Cgithub.beam.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26%40%3Cdev.tika.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374%40%3Cissues.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f%40%3Cdev.tika.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2017-5645 cve-icon
https://security.netapp.com/advisory/ntap-20180726-0002/ cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20181107-0002/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2017-5645 cve-icon
https://www.oracle.com/security-alerts/cpuApr2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2021.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html cve-icon cve-icon
History

No history.

Subscriptions

Apache Log4j
Netapp Oncommand Api Services Oncommand Insight Oncommand Workflow Automation Service Level Manager Snapcenter Storage Automation Store
Oracle Api Gateway Application Testing Suite Autovue Vuelink Integration Banking Platform Bi Publisher Communications Converged Application Server - Service Controller Communications Instant Messaging Server Communications Interactive Session Recorder Communications Messaging Server Communications Network Integrity Communications Online Mediation Controller Communications Pricing Design Center Communications Service Broker Communications Webrtc Session Controller Configuration Manager Endeca Information Discovery Studio Enterprise Data Quality Enterprise Manager Base Platform Enterprise Manager For Fusion Middleware Enterprise Manager For Mysql Database Enterprise Manager For Oracle Database Enterprise Manager For Peoplesoft Financial Services Analytical Applications Infrastructure Financial Services Behavior Detection Platform Financial Services Hedge Management And Ifrs Valuations Financial Services Lending And Leasing Financial Services Loan Loss Forecasting And Provisioning Financial Services Profitability Management Financial Services Regulatory Reporting With Agilereporter Flexcube Investor Servicing Fusion Middleware Mapviewer Goldengate Goldengate Application Adapters Identity Analytics Identity Management Suite Identity Manager Connector In-memory Performance-driven Planning Instantis Enterprisetrack Insurance Calculation Engine Insurance Policy Administration Insurance Rules Palette Jd Edwards Enterpriseone Tools Jdeveloper Mysql Enterprise Monitor Peoplesoft Enterprise Fin Install Policy Automation Policy Automation Connector For Siebel Policy Automation For Mobile Devices Primavera Gateway Rapid Planning Retail Advanced Inventory Planning Retail Clearance Optimization Engine Retail Extract Transform And Load Retail Integration Bus Retail Open Commerce Platform Retail Predictive Application Server Retail Service Backbone Siebel Ui Framework Soa Suite Tape Library Acsls Timesten In-memory Database Utilities Advanced Spatial And Operational Analytics Utilities Work And Asset Management Weblogic Server
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Eus Enterprise Linux Server Tus Enterprise Linux Workstation Fuse Jboss Bpms Jboss Data Grid Jboss Enterprise Application Platform Jboss Enterprise Brms Platform Jboss Enterprise Web Server Jboss Fuse Rhel Software Collections
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-05T15:11:47.391Z

Reserved: 2017-01-29T00:00:00.000Z

Link: CVE-2017-5645

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-04-17T21:59:00.373

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-5645

cve-icon Redhat

Severity : Important

Publid Date: 2017-04-02T00:00:00Z

Links: CVE-2017-5645 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses