logback version 1.4.13, 1.3.13 and 1.2.12 allows an attacker to mount a Denial-Of-Service
attack by sending poisoned data.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-3212 | A serialization vulnerability in logback receiver component part of logback version 1.4.13, 1.3.13 and 1.2.12 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data. |
![]() |
GHSA-gm62-rw4g-vrc4 | Logback is vulnerable to an attacker mounting a Denial-Of-Service attack by sending poisoned data |
Solution
Only environments where logback receiver component is deployed may be vulnerable. In case a logback receiver is deployed, restricting connections to trustworthy clients or upgrading to logback version 1.4.14, 1.3.14, 1.2.13 or later will remedy the vulnerability. If you do not need to deploy logback-receiver, then please verify that you do not have any <receiver></receiver> entries in your configuration files.
Workaround
Logback versions 1.2.13 and later, 1.3.14 and later or 1.4.14 and later provides fixes. However, please note that these fixes are only effective when deployed under Java 9 or later.
Thu, 29 Aug 2024 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat jboss Enterprise Bpms Platform
|
|
CPEs | cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13 | |
Vendors & Products |
Redhat jboss Enterprise Bpms Platform
|

Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2024-08-02T08:28:21.829Z
Reserved: 2023-12-04T08:34:29.742Z
Link: CVE-2023-6481

No data.

Status : Modified
Published: 2023-12-04T09:15:37.250
Modified: 2024-11-21T08:43:56.147
Link: CVE-2023-6481


No data.