logback version 1.4.11 allows an attacker to mount a Denial-Of-Service
attack by sending poisoned data.
No analysis available yet.
Vendor Solution
Only environments where logback receiver component is deployed may be vulnerable. In case a logback receiver is deployed, restricting connections to trustworthy clients or upgrading to logback version 1.4.12 or later will remedy the vulnerability.
Vendor Workaround
Only environments where logback receiver is deployed are vulnerable.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-3046 | A serialization vulnerability in logback receiver component part of logback version 1.4.11 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data. |
Github GHSA |
GHSA-vmq6-5m68-f53m | logback serialization vulnerability |
Ubuntu USN |
USN-7616-1 | logback vulnerabilities |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 29 Nov 2024 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 11 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2024-11-29T12:04:40.421Z
Reserved: 2023-11-29T10:18:07.523Z
Link: CVE-2023-6378
Updated: 2024-11-29T12:04:40.421Z
Status : Modified
Published: 2023-11-29T12:15:07.543
Modified: 2024-11-29T12:15:06.597
Link: CVE-2023-6378
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN