Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Apache
Subscribe
|
|
|
Canonical
Subscribe
|
Ubuntu Linux
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Netapp
Subscribe
|
|
|
Opensuse
Subscribe
|
Leap
Subscribe
|
|
Oracle
Subscribe
|
Application Testing Suite
Subscribe
Communications Network Integrity
Subscribe
Endeca Information Discovery Studio
Subscribe
Financial Services Lending And Leasing
Subscribe
Mysql Enterprise Monitor
Subscribe
Primavera Gateway
Subscribe
Rapid Planning
Subscribe
Retail Extract Transform And Load
Subscribe
Retail Service Backbone
Subscribe
Weblogic Server
Subscribe
|
|
Redhat
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2065-1 | apache-log4j1.2 security update |
Debian DSA |
DSA-4686-1 | apache-log4j1.2 security update |
Github GHSA |
GHSA-2qrg-x229-3v8q | Deserialization of Untrusted Data in Log4j |
Ubuntu USN |
USN-4495-1 | Apache Log4j vulnerability |
Ubuntu USN |
USN-5998-1 | Apache Log4j vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-05T01:40:15.836Z
Reserved: 2019-10-14T00:00:00
Link: CVE-2019-17571
No data.
Status : Modified
Published: 2019-12-20T17:15:11.893
Modified: 2024-11-21T04:32:33.393
Link: CVE-2019-17571
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN