ID CVE-2023-26464
Summary ** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested) hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized. This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:log4j:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2:-:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2:-:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2:beta4:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2:beta4:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:log4j:1.2.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:log4j:1.2.17:*:*:*:*:*:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE CWE-502
CAPEC
  • Object Injection
    An adversary attempts to exploit an application by injecting additional, malicious content during its processing of serialized objects. Developers leverage serialization in order to convert data or state into a static, binary format for saving to disk or transferring over a network. These objects are then deserialized when needed to recover the data/state. By injecting a malformed object into a vulnerable application, an adversary can potentially compromise the application by manipulating the deserialization process. This can result in a number of unwanted outcomes, including remote code execution.
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 05-05-2023 - 20:15
Published 10-03-2023 - 14:15
Last modified 05-05-2023 - 20:15
Back to Top