BDU:2021-05969

Vulnerability from fstec - Published: 10.12.2021
VLAI Severity ?
Title
Уязвимость компонента JNDI библиотеки журналирования Java-программ Apache Log4j2, позволяющая нарушителю выполнить произвольный код
Description
Уязвимость компонента JNDI библиотеки журналирования Java-программ Apache Log4j2 связана с недостаточной проверкой вводимых данных. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить произвольный код
Vendor
Cisco Systems Inc., Сообщество свободного программного обеспечения, Siemens AG, Red Hat Inc., ООО «Ред Софт», NetApp Inc., Microsoft Corp, АО «Концерн ВНИИНС», SonicWall, Juniper Networks Inc., Dell Technologies, Apache Software Foundation, АО "НППКТ", ООО «Юбитех»
Software Name
Cisco Identity Services Engine, Debian GNU/Linux, Cisco Registered Envelope Service, Cisco Umbrella, LOGO! Soft Comfort, Cisco Evolved Programmable Network Manager, OpenShift Container Platform, Jboss Fuse, РЕД ОС (запись в едином реестре российских программ №3751), Oncommand Insight, OpenShift Application Runtimes, Red Hat Descision Manager, JBoss A-MQ Streaming, Cisco Webex Meetings, Red Hat OpenStack Platform, JBoss EAP, CodeReady Studio, A-MQ Clients, Data Grid, Cisco DNA Center, Azure Spring Cloud, Red Hat build of Quarkus, Red Hat Integration Camel K, UCS Director, Red Hat Integration Camel Quarkus, ОС ОН «Стрелец» (запись в едином реестре российских программ №6177), Email Security, Cisco Advanced Web Security Reporting Application, Cisco CloudCenter Suite Admin, Crosswork Change Automation, Integrated Management Controller (IMC) Supervisor, Intersight Virtual Appliance, Network Services Orchestrator, Cisco Nexus Dashboard, Cisco WAN Automation Engine (WAE), Catalyst SD-WAN Manager, Cisco BroadCloud, Cisco Computer Telephony Integration Object Server (CTIOS), Enterprise Chat and Email, Cisco Packaged Contact Center Enterprise, Cisco Unified Contact Center Enterprise, Cisco Unified SIP Proxy Software, Video Surveillance Manager, Cisco Kinetic for Cities, Cisco Unified Communications Manager Cloud, Cisco Webex Cloud-Connected UC (CCUC), Cisco Managed Services Accelerator, Cisco ThousandEyes Recorder, OpenShift Logging, Red Hat JBoss Enterprise Application Platform Expansion Pack, Cloud Manager, ONTAP Tools for VMware vSphere, SnapCenter Plug-in, Brocade SAN Navigator (SANnav), Networks NorthStar Controller Application, Juniper Networks Paragon Insights, Juniper Networks Paragon Pathfinder, Juniper Networks Paragon Planner, Capital, Comos Desktop App, Desigo CC Advanced Reporting, Desigo CC Info Center, E-Car OC Cloud Application, EnergyIP Prepay, GMA-Manager, HES UDIS, Industrial Edge Management App (IEM-App), Industrial Edge Management OS (IEM-OS), Industrial Edge Manangement Hub, Mendix Applications, Mindsphere Cloud Application, Siemens NX, Opcenter Intelligence, Operation Scheduler, SIGUARD DSA, SIMATIC WinCC, Siveillance Command, Siveillance Control Pro, Siveillance Identity, Siveillance Vantage, Solid Edge Wiring Harness Design, Spectrum Power 4, Teamcenter Suite, VeSys, Xpedition EDM Client, Xpedition EDM Server, Xpedition Package Integrator, EMC Connectrix SANnav, Enterprise Hybrid Cloud, EMC Enterprise Storage Analytics for vRealize Operations, Storage Analytics for vRealize Operations, VxRail, Wyse Management Suite, Log4j, Azure Application Insights Java SDK, Azure Data Lake Store Java tool, Azure Data Lake Store Java client SDK, Azure DevOps Server, Azure DevOps, Team Foundation Server, SQL Server 2019 Big Data Clusters, Azure VMware Solution, Azure Databricks, Azure Arc-enabled Data Services, Minecraft Java Edition, Defender for IoT, Events Hub Extension, Cosmos DB Kafka Connector, ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913), UBLinux (запись в едином реестре российских программ №6874)
Software Version
. (Cisco Identity Services Engine), 9 (Debian GNU/Linux), - (Cisco Registered Envelope Service), - (Cisco Umbrella), - (LOGO! Soft Comfort), - (Cisco Evolved Programmable Network Manager), 3.11 (OpenShift Container Platform), 7 (Jboss Fuse), 10 (Debian GNU/Linux), 7.2 Муром (РЕД ОС), - (Oncommand Insight), - (OpenShift Application Runtimes), 7 (Red Hat Descision Manager), - (JBoss A-MQ Streaming), - (Cisco Webex Meetings), 13.0 (Queens) (Red Hat OpenStack Platform), 4 (OpenShift Container Platform), 7 (JBoss EAP), 12 (CodeReady Studio), 2 (A-MQ Clients), 8 (Data Grid), - (Cisco DNA Center), - (Azure Spring Cloud), - (Red Hat build of Quarkus), - (Red Hat Integration Camel K), - (UCS Director), - (Red Hat Integration Camel Quarkus), 1.0 (ОС ОН «Стрелец»), 11 (Debian GNU/Linux), - (Email Security), - (Cisco Advanced Web Security Reporting Application), - (Cisco CloudCenter Suite Admin), - (Crosswork Change Automation), - (Integrated Management Controller (IMC) Supervisor), - (Intersight Virtual Appliance), - (Network Services Orchestrator), до 2.1.2 (Cisco Nexus Dashboard), - (Cisco WAN Automation Engine (WAE)), - (Catalyst SD-WAN Manager), - (Cisco BroadCloud), - (Cisco Computer Telephony Integration Object Server (CTIOS)), - (Enterprise Chat and Email), - (Cisco Packaged Contact Center Enterprise), - (Cisco Unified Contact Center Enterprise), - (Cisco Unified SIP Proxy Software), - (Video Surveillance Manager), - (Cisco Kinetic for Cities), - (Cisco Unified Communications Manager Cloud), - (Cisco Webex Cloud-Connected UC (CCUC)), - (Cisco Managed Services Accelerator), - (Cisco ThousandEyes Recorder), - (OpenShift Logging), - (Red Hat JBoss Enterprise Application Platform Expansion Pack), - (Cloud Manager), - (ONTAP Tools for VMware vSphere), - (SnapCenter Plug-in), - (Brocade SAN Navigator (SANnav)), - (Networks NorthStar Controller Application), - (Juniper Networks Paragon Insights), - (Juniper Networks Paragon Pathfinder), - (Juniper Networks Paragon Planner), до 2019.1 SP1912 включительно (Capital), - (Comos Desktop App), 4.0 (Desigo CC Advanced Reporting), 4.1 (Desigo CC Advanced Reporting), 4.2 (Desigo CC Advanced Reporting), 5.0 (Desigo CC Advanced Reporting), 5.1 (Desigo CC Advanced Reporting), 5.0 (Desigo CC Info Center), 5.1 (Desigo CC Info Center), до 2021-12-13 (E-Car OC Cloud Application), 3.7 (EnergyIP Prepay), 3.8 (EnergyIP Prepay), до 8.6.2j-398 (GMA-Manager), - (HES UDIS), - (Industrial Edge Management App (IEM-App)), - (Industrial Edge Management OS (IEM-OS)), - (Industrial Edge Manangement Hub), - (Mendix Applications), до 2021-12-11 (Mindsphere Cloud Application), - (Siemens NX), до 3.2 (Opcenter Intelligence), до 1.1.3 включительно (Operation Scheduler), 4.2 (SIGUARD DSA), 4.3 (SIGUARD DSA), 4.4 (SIGUARD DSA), до 7.4 SP1 (SIMATIC WinCC), до 4.16.2.1 включительно (Siveillance Command), - (Siveillance Control Pro), - (Siveillance Identity), - (Siveillance Vantage), до 2020 SP2002 включительно (Solid Edge Wiring Harness Design), - (Spectrum Power 4), - (Teamcenter Suite), до 2019.1 SP1912 включительно (VeSys), от VX.2.6 до VX.2.10 включительно (Xpedition EDM Client), от VX.2.6 до VX.2.10 включительно (Xpedition EDM Server), от X.2.6 до X.2.10 включительно (Xpedition Package Integrator), 2.1.1 (EMC Connectrix SANnav), 4.1.2 (Enterprise Hybrid Cloud), до 6.3.0 (EMC Enterprise Storage Analytics for vRealize Operations), до 6.3.0 (Storage Analytics for vRealize Operations), - (VxRail), до 3.5.1 (Wyse Management Suite), до 2.3.1 (Log4j), до 2.12.3 (Log4j), до 2.17.0 (Log4j), - (Azure Application Insights Java SDK), - (Azure Data Lake Store Java tool), - (Azure Data Lake Store Java client SDK), - (Azure DevOps Server), - (Azure DevOps), - (Team Foundation Server), - (SQL Server 2019 Big Data Clusters), - (Azure VMware Solution), - (Azure Databricks), - (Azure Arc-enabled Data Services), - (Minecraft Java Edition), - (Defender for IoT), - (Events Hub Extension), - (Cosmos DB Kafka Connector), до 2.4.2 (ОСОН ОСнова Оnyx), до 2204 (UBLinux), до 16.01.2023 (ОС ОН «Стрелец»)
Possible Mitigations
Использование рекомендаций: Для Apache Log4j2: https://logging.apache.org/log4j/2.x/security.html Для программных продуктов Cisco Systems Inc.: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd Для программных продуктов Red Hat Inc.: https://access.redhat.com/security/cve/CVE-2021-44228 Для программных продуктов SonicWall: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 Для Debian GNU/Linux: https://security-tracker.debian.org/tracker/CVE-2021-44228 Для программных продуктов NetApp Inc.: https://security.netapp.com/advisory/ntap-20211210-0007/ Для программных продуктов Juniper Networks Inc.: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&cat=SIRT_1&actp=LIST Для программных продуктов Siemens AG: https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf Для программных продуктов Dell Inc.: https://www.dell.com/support/kbdoc/ru-ru/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability Для РедОС: http://repo.red-soft.ru/redos/7.2c/x86_64/updates/ Для программных продуктов Microsoft Corp.: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-44228 Для UBLinux: https://security.ublinux.ru/AVG-45 Для ОС ОН «Стрелец»: https://strelets.net/patchi-i-obnovleniya-bezopasnosti#kumulyativnoe-obnovlenie Для ОСОН Основа: Обновление программного обеспечения apache-log4j2 до версии 2.17.0+repack-1~deb10u1.osnova1 Для ОС ОН «Стрелец»: Обновление программного обеспечения apache-log4j2 до версии 2.12.4-0+deb9u1
Reference
https://access.redhat.com/security/cve/CVE-2021-44228 https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259&cat=SIRT_1&actp=LIST https://logging.apache.org/log4j/2.x/security.html https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 https://redos.red-soft.ru/updatesec/ https://security.ublinux.ru/AVG-45 https://security.netapp.com/advisory/ntap-20211210-0007/ https://security-tracker.debian.org/tracker/CVE-2021-44228 https://strelets.net/patchi-i-obnovleniya-bezopasnosti#26012022 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd https://www.dell.com/support/kbdoc/ru-ru/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability https://www.securitylab.ru/news/527397.php https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.4.2/ https://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023
CWE
CWE-20, CWE-400, CWE-502

{
  "CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  "CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Siemens AG, Red Hat Inc., \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, NetApp Inc., Microsoft Corp, \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb, SonicWall, Juniper Networks Inc., Dell Technologies, Apache Software Foundation, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u041e\u041e\u041e \u00ab\u042e\u0431\u0438\u0442\u0435\u0445\u00bb",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": ". (Cisco Identity Services Engine), 9 (Debian GNU/Linux), - (Cisco Registered Envelope Service), - (Cisco Umbrella), - (LOGO! Soft Comfort), - (Cisco Evolved Programmable Network Manager), 3.11 (OpenShift Container Platform), 7 (Jboss Fuse), 10 (Debian GNU/Linux), 7.2 \u041c\u0443\u0440\u043e\u043c (\u0420\u0415\u0414 \u041e\u0421), - (Oncommand Insight), - (OpenShift Application Runtimes), 7 (Red Hat Descision Manager), - (JBoss A-MQ Streaming), - (Cisco Webex Meetings), 13.0 (Queens) (Red Hat OpenStack Platform), 4 (OpenShift Container Platform), 7 (JBoss EAP), 12 (CodeReady Studio), 2 (A-MQ Clients), 8 (Data Grid), - (Cisco DNA Center), - (Azure Spring Cloud), - (Red Hat build of Quarkus), - (Red Hat Integration Camel K), - (UCS Director), - (Red Hat Integration Camel Quarkus), 1.0 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb), 11 (Debian GNU/Linux), - (Email Security), - (Cisco Advanced Web Security Reporting Application), - (Cisco CloudCenter Suite Admin), - (Crosswork Change Automation), - (Integrated Management Controller (IMC) Supervisor), - (Intersight Virtual Appliance), - (Network Services Orchestrator), \u0434\u043e 2.1.2 (Cisco Nexus Dashboard), - (Cisco WAN Automation Engine (WAE)), - (Catalyst SD-WAN Manager), - (Cisco BroadCloud), - (Cisco Computer Telephony Integration Object Server (CTIOS)), - (Enterprise Chat and Email), - (Cisco Packaged Contact Center Enterprise), - (Cisco Unified Contact Center Enterprise), - (Cisco Unified SIP Proxy Software), - (Video Surveillance Manager), - (Cisco Kinetic for Cities), - (Cisco Unified Communications Manager Cloud), - (Cisco Webex Cloud-Connected UC (CCUC)), - (Cisco Managed Services Accelerator), - (Cisco ThousandEyes Recorder), - (OpenShift Logging), - (Red Hat JBoss Enterprise Application Platform Expansion Pack), - (Cloud Manager), - (ONTAP Tools for VMware vSphere), - (SnapCenter Plug-in), - (Brocade SAN Navigator (SANnav)), - (Networks NorthStar Controller Application), - (Juniper Networks Paragon Insights), - (Juniper Networks Paragon Pathfinder), - (Juniper Networks Paragon Planner), \u0434\u043e 2019.1 SP1912 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Capital), - (Comos Desktop App), 4.0 (Desigo CC Advanced Reporting), 4.1 (Desigo CC Advanced Reporting), 4.2 (Desigo CC Advanced Reporting), 5.0 (Desigo CC Advanced Reporting), 5.1 (Desigo CC Advanced Reporting), 5.0 (Desigo CC Info Center), 5.1 (Desigo CC Info Center), \u0434\u043e 2021-12-13 (E-Car OC Cloud Application), 3.7 (EnergyIP Prepay), 3.8 (EnergyIP Prepay), \u0434\u043e 8.6.2j-398 (GMA-Manager), - (HES UDIS), - (Industrial Edge Management App (IEM-App)), - (Industrial Edge Management OS (IEM-OS)), - (Industrial Edge Manangement Hub), - (Mendix Applications), \u0434\u043e 2021-12-11 (Mindsphere Cloud Application), - (Siemens NX), \u0434\u043e 3.2 (Opcenter Intelligence), \u0434\u043e 1.1.3 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Operation Scheduler), 4.2 (SIGUARD DSA), 4.3 (SIGUARD DSA), 4.4 (SIGUARD DSA), \u0434\u043e 7.4 SP1 (SIMATIC WinCC), \u0434\u043e 4.16.2.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Siveillance Command), - (Siveillance Control Pro), - (Siveillance Identity), - (Siveillance Vantage), \u0434\u043e 2020 SP2002 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Solid Edge Wiring Harness Design), - (Spectrum Power 4), - (Teamcenter Suite), \u0434\u043e 2019.1 SP1912 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (VeSys), \u043e\u0442 VX.2.6 \u0434\u043e VX.2.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Xpedition EDM Client), \u043e\u0442 VX.2.6 \u0434\u043e VX.2.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Xpedition EDM Server), \u043e\u0442 X.2.6 \u0434\u043e X.2.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Xpedition Package Integrator), 2.1.1 (EMC Connectrix SANnav), 4.1.2 (Enterprise Hybrid Cloud), \u0434\u043e 6.3.0 (EMC Enterprise Storage Analytics for vRealize Operations), \u0434\u043e 6.3.0 (Storage Analytics for vRealize Operations), - (VxRail), \u0434\u043e 3.5.1 (Wyse Management Suite), \u0434\u043e 2.3.1 (Log4j), \u0434\u043e 2.12.3 (Log4j), \u0434\u043e 2.17.0 (Log4j), - (Azure Application Insights Java SDK), - (Azure Data Lake Store Java tool), - (Azure Data Lake Store Java client SDK), - (Azure DevOps Server), - (Azure DevOps), - (Team Foundation Server), - (SQL Server 2019 Big Data Clusters), - (Azure VMware Solution), - (Azure Databricks), - (Azure Arc-enabled Data Services), - (Minecraft Java Edition), - (Defender for IoT), - (Events Hub Extension), - (Cosmos DB Kafka Connector), \u0434\u043e 2.4.2 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u0434\u043e 2204 (UBLinux), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Apache Log4j2:\nhttps://logging.apache.org/log4j/2.x/security.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Cisco Systems Inc.:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2021-44228\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 SonicWall:\nhttps://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2021-44228\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 NetApp Inc.:\nhttps://security.netapp.com/advisory/ntap-20211210-0007/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Juniper Networks Inc.:\nhttps://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11259\u0026cat=SIRT_1\u0026actp=LIST\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Siemens AG:\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Dell Inc.:\nhttps://www.dell.com/support/kbdoc/ru-ru/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421:\nhttp://repo.red-soft.ru/redos/7.2c/x86_64/updates/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Microsoft Corp.:\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-44228\n\n\u0414\u043b\u044f UBLinux:\nhttps://security.ublinux.ru/AVG-45\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#kumulyativnoe-obnovlenie\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0441\u043d\u043e\u0432\u0430:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f apache-log4j2 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.17.0+repack-1~deb10u1.osnova1\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f apache-log4j2 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.12.4-0+deb9u1",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "10.12.2021",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.11.2023",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "13.12.2021",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-05969",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-44228",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Cisco Identity Services Engine, Debian GNU/Linux, Cisco Registered Envelope Service, Cisco Umbrella, LOGO! Soft Comfort, Cisco Evolved Programmable Network Manager, OpenShift Container Platform, Jboss Fuse, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Oncommand Insight, OpenShift Application Runtimes, Red Hat Descision Manager, JBoss A-MQ Streaming, Cisco Webex Meetings, Red Hat OpenStack Platform, JBoss EAP, CodeReady Studio, A-MQ Clients, Data Grid, Cisco DNA Center, Azure Spring Cloud, Red Hat build of Quarkus, Red Hat Integration Camel K, UCS Director, Red Hat Integration Camel Quarkus, \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177), Email Security, Cisco Advanced Web Security Reporting Application, Cisco CloudCenter Suite Admin, Crosswork Change Automation, Integrated Management Controller (IMC) Supervisor, Intersight Virtual Appliance, Network Services Orchestrator, Cisco Nexus Dashboard, Cisco WAN Automation Engine (WAE), Catalyst SD-WAN Manager, Cisco BroadCloud, Cisco Computer Telephony Integration Object Server (CTIOS), Enterprise Chat and Email, Cisco Packaged Contact Center Enterprise, Cisco Unified Contact Center Enterprise, Cisco Unified SIP Proxy Software, Video Surveillance Manager, Cisco Kinetic for Cities, Cisco Unified Communications Manager Cloud, Cisco Webex Cloud-Connected UC (CCUC), Cisco Managed Services Accelerator, Cisco ThousandEyes Recorder, OpenShift Logging, Red Hat JBoss Enterprise Application Platform Expansion Pack, Cloud Manager, ONTAP Tools for VMware vSphere, SnapCenter Plug-in, Brocade SAN Navigator (SANnav), Networks NorthStar Controller Application, Juniper Networks Paragon Insights, Juniper Networks Paragon Pathfinder, Juniper Networks Paragon Planner, Capital, Comos Desktop App, Desigo CC Advanced Reporting, Desigo CC Info Center, E-Car OC Cloud Application, EnergyIP Prepay, GMA-Manager, HES UDIS, Industrial Edge Management App (IEM-App), Industrial Edge Management OS (IEM-OS), Industrial Edge Manangement Hub, Mendix Applications, Mindsphere Cloud Application, Siemens NX, Opcenter Intelligence, Operation Scheduler, SIGUARD DSA, SIMATIC WinCC, Siveillance Command, Siveillance Control Pro, Siveillance Identity, Siveillance Vantage, Solid Edge Wiring Harness Design, Spectrum Power 4, Teamcenter Suite, VeSys, Xpedition EDM Client, Xpedition EDM Server, Xpedition Package Integrator, EMC Connectrix SANnav, Enterprise Hybrid Cloud, EMC Enterprise Storage Analytics for vRealize Operations, Storage Analytics for vRealize Operations, VxRail, Wyse Management Suite, Log4j, Azure Application Insights Java SDK, Azure Data Lake Store Java tool, Azure Data Lake Store Java client SDK, Azure DevOps Server, Azure DevOps, Team Foundation Server, SQL Server 2019 Big Data Clusters, Azure VMware Solution, Azure Databricks, Azure Arc-enabled Data Services, Minecraft Java Edition, Defender for IoT, Events Hub Extension, Cosmos DB Kafka Connector, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), UBLinux (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166874)",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.2 \u041c\u0443\u0440\u043e\u043c  (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb 1.0  (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.4.2  (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u041e\u041e\u041e \u00ab\u042e\u0431\u0438\u0442\u0435\u0445\u00bb UBLinux \u0434\u043e 2204  (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166874), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023  (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 JNDI \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0436\u0443\u0440\u043d\u0430\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Java-\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c Apache Log4j2, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20), \u041d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0440\u0430\u0441\u0445\u043e\u0434 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0418\u0441\u0442\u043e\u0449\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u00bb) (CWE-400), \u0412\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u043e\u0432\u0435\u0440\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-502)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 JNDI \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0436\u0443\u0440\u043d\u0430\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Java-\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c Apache Log4j2 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 Log4Shell",
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445, \u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://access.redhat.com/security/cve/CVE-2021-44228\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf\nhttps://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept\nhttps://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11259\u0026cat=SIRT_1\u0026actp=LIST\nhttps://logging.apache.org/log4j/2.x/security.html\nhttps://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032\nhttps://redos.red-soft.ru/updatesec/\nhttps://security.ublinux.ru/AVG-45\nhttps://security.netapp.com/advisory/ntap-20211210-0007/\nhttps://security-tracker.debian.org/tracker/CVE-2021-44228\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#26012022\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd\nhttps://www.dell.com/support/kbdoc/ru-ru/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability\nhttps://www.securitylab.ru/news/527397.php\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.4.2/\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u044b, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0430, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u0421\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0410\u0421\u0423 \u0422\u041f",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20, CWE-400, CWE-502",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…