A serialization vulnerability in logback receiver component part of
logback version 1.4.13, 1.3.13 and 1.2.12 allows an attacker to mount a Denial-Of-Service
attack by sending poisoned data.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-3212 A serialization vulnerability in logback receiver component part of logback version 1.4.13, 1.3.13 and 1.2.12 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
Github GHSA Github GHSA GHSA-gm62-rw4g-vrc4 Logback is vulnerable to an attacker mounting a Denial-Of-Service attack by sending poisoned data
Fixes

Solution

Only environments where logback receiver component is deployed may be vulnerable. In case a logback receiver is deployed, restricting connections to trustworthy clients or upgrading to logback version 1.4.14, 1.3.14, 1.2.13 or later will remedy the vulnerability. If you do not need to deploy logback-receiver, then please verify that you do not have any <receiver></receiver> entries in your configuration files.


Workaround

Logback versions 1.2.13 and later, 1.3.14 and later  or 1.4.14 and later provides fixes. However, please note that these fixes are only effective when deployed under Java 9 or later.

History

Thu, 29 Aug 2024 06:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Bpms Platform
CPEs cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13
Vendors & Products Redhat jboss Enterprise Bpms Platform

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2024-08-02T08:28:21.829Z

Reserved: 2023-12-04T08:34:29.742Z

Link: CVE-2023-6481

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-04T09:15:37.250

Modified: 2024-11-21T08:43:56.147

Link: CVE-2023-6481

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-12-04T00:00:00Z

Links: CVE-2023-6481 - Bugzilla

cve-icon OpenCVE Enrichment

No data.