logback version 1.4.13, 1.3.13 and 1.2.12 allows an attacker to mount a Denial-Of-Service
attack by sending poisoned data.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-3212 | A serialization vulnerability in logback receiver component part of logback version 1.4.13, 1.3.13 and 1.2.12 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data. |
Github GHSA |
GHSA-gm62-rw4g-vrc4 | Logback is vulnerable to an attacker mounting a Denial-Of-Service attack by sending poisoned data |
Solution
Only environments where logback receiver component is deployed may be vulnerable. In case a logback receiver is deployed, restricting connections to trustworthy clients or upgrading to logback version 1.4.14, 1.3.14, 1.2.13 or later will remedy the vulnerability. If you do not need to deploy logback-receiver, then please verify that you do not have any <receiver></receiver> entries in your configuration files.
Workaround
Logback versions 1.2.13 and later, 1.3.14 and later or 1.4.14 and later provides fixes. However, please note that these fixes are only effective when deployed under Java 9 or later.
Thu, 29 Aug 2024 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat jboss Enterprise Bpms Platform
|
|
| CPEs | cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13 | |
| Vendors & Products |
Redhat jboss Enterprise Bpms Platform
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2024-08-02T08:28:21.829Z
Reserved: 2023-12-04T08:34:29.742Z
Link: CVE-2023-6481
No data.
Status : Modified
Published: 2023-12-04T09:15:37.250
Modified: 2024-11-21T08:43:56.147
Link: CVE-2023-6481
OpenCVE Enrichment
No data.
EUVD
Github GHSA