A serialization vulnerability in logback receiver component part of
logback version 1.4.11 allows an attacker to mount a Denial-Of-Service
attack by sending poisoned data.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-3046 A serialization vulnerability in logback receiver component part of logback version 1.4.11 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
Github GHSA Github GHSA GHSA-vmq6-5m68-f53m logback serialization vulnerability
Ubuntu USN Ubuntu USN USN-7616-1 logback vulnerabilities
Fixes

Solution

Only environments where logback receiver component is deployed may be vulnerable. In case a logback receiver is deployed, restricting connections to trustworthy clients or upgrading to logback version 1.4.12 or later will remedy the vulnerability.


Workaround

Only environments where logback receiver is deployed are vulnerable.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00652}

epss

{'score': 0.0067}


Fri, 29 Nov 2024 12:30:00 +0000

Type Values Removed Values Added
References

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2024-11-29T12:04:40.421Z

Reserved: 2023-11-29T10:18:07.523Z

Link: CVE-2023-6378

cve-icon Vulnrichment

Updated: 2024-11-29T12:04:40.421Z

cve-icon NVD

Status : Modified

Published: 2023-11-29T12:15:07.543

Modified: 2024-11-29T12:15:06.597

Link: CVE-2023-6378

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-11-29T00:00:00Z

Links: CVE-2023-6378 - Bugzilla

cve-icon OpenCVE Enrichment

No data.