wid-sec-w-2022-0811
Vulnerability from csaf_certbund
Published
2021-12-19 23:00
Modified
2022-12-11 23:00
Summary
Apache log4j: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache log4j ist ein Framework zum Loggen von Anwendungsmeldungen in Java.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Apache log4j ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
- MacOS X
- Windows
- CISCO Appliance
- NetApp Appliance
- Native Hypervisor
- Applicance
- Sonstiges
- Hardware Appliance
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache log4j ist ein Framework zum Loggen von Anwendungsmeldungen in Java.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Apache log4j ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- MacOS X\n- Windows\n- CISCO Appliance\n- NetApp Appliance\n- Native Hypervisor\n- Applicance\n- Sonstiges\n- Hardware Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0811 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0811.json" }, { "category": "self", "summary": "WID-SEC-2022-0811 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0811" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-225 vom 2022-12-09", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-225.html" }, { "category": "external", "summary": "Apache Log4j Security Vulnerabilities vom 2021-12-17", "url": "https://logging.apache.org/log4j/2.x/security.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5203-1", "url": "https://ubuntu.com/security/notices/USN-5203-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5024-1", "url": "https://www.debian.org/security/2021/dsa-5024" }, { "category": "external", "summary": "Citrix Security Advisory CTX335705", "url": "https://support.citrix.com/article/CTX335705" }, { "category": "external", "summary": "Cisco Security Advisory cisco-sa-apache-log4j-qRuKNEbd", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-P6XC-XR62-6R2G", "url": "https://github.com/advisories/GHSA-p6xc-xr62-6r2g" }, { "category": "external", "summary": "PoC", "url": "https://twitter.com/hack_git/status/1472455892503306243" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20211218-0001", "url": "https://security.netapp.com/advisory/ntap-20211218-0001/" }, { "category": "external", "summary": "Siemens Security Advisory SSA-501673", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf" }, { "category": "external", "summary": "Cisco Security Advisory cisco-sa-apache-log4j-qRuKNEbd vom 2021-12-20", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd" }, { "category": "external", "summary": "Apache Log4j 2 Release Notes", "url": "https://logging.apache.org/log4j/log4j-2.12.3/index.html" }, { "category": "external", "summary": "Apache Log4j2 Advisory", "url": "https://logging.apache.org/log4j/log4j-2.3.1/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 6528672 vom 2021-12-22", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-apache-log4j-affects-some-features-of-ibm-db2-cve-2021-45046-cve-2021-45105/" }, { "category": "external", "summary": "IBM Security Bulletin 6536870 vom 2021-12-23", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-apache-log4j-affects-ibm-spss-analytic-server-cve-2021-45105-and-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Bulletin 6536704 vom 2021-12-23", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-apache-log4j-affects-spss-collaboration-and-deployment-services/" }, { "category": "external", "summary": "WIBU Security Advisory WIBU-211220-01 vom 2021-12-23", "url": "https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-211220-01.pdf" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-008 vom 2021-12-24", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2021-008.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1733 vom 2021-12-24", "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1733.html" }, { "category": "external", "summary": "IBM Security Bulletin 6537186 vom 2021-12-27", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-apache-log4j-vulnerabilities-cve-2021-45105-affecting-v2-16-and-cve-2021-45046-affecting-v2-15-affect-ibm-spss-statistics-subscription/" }, { "category": "external", "summary": "IBM Security Bulletin 6537184 vom 2021-12-27", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-apache-log4j-vulnerabilities-cve-2021-45105-affecting-v2-16-and-cve-2021-45046-affecting-v2-15-affect-ibm-spss-statistics-server/" }, { "category": "external", "summary": "IBM Security Bulletin 6537142 vom 2021-12-25", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-vulnerable-to-a-denial-of-service-vulnerability-in-apache-log4j2-component-cve-2021-45105-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Bulletin 6537182 vom 2021-12-27", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-apache-log4j-vulnerabilities-cve-2021-45105-affecting-v2-16-and-cve-2021-45046-affecting-v2-15-affect-ibm-spss-statistics-desktop/" }, { "category": "external", "summary": "Debian Security Advisory DLA-2852 vom 2021-12-26", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html" }, { "category": "external", "summary": "IBM Security Bulletin 6537180 vom 2021-12-27", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-spss-statistics-is-vulnerable-to-denial-of-service-due-to-apache-log4j-cve-2021-45105-and-arbitrary-code-execution-due-to-apache-log4j-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Bulletin 6537212 vom 2021-12-28", "url": "https://www.ibm.com/blogs/psirt/security-bulletinibm-spss-modeler-is-vulnerable-to-denial-of-service-due-to-apache-log4j-cve-2021-45105-and-arbitrary-code-execution-due-to-apache-log4j-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Bulletin 6537240 vom 2021-12-28", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-apache-log4j-affect-ibm-spectrum-protect-operations-center-cve-2021-45105-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Bulletin 6537748 vom 2021-12-31", "url": "https://www.ibm.com/support/pages/node/6537748" }, { "category": "external", "summary": "IBM Security Bulletin 6537636 vom 2022-01-04", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-apache-log4j-affect-ibm-spectrum-protect-plus-container-backup-and-restore-for-kubernetes-and-openshift-cve-2021-45105-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Bulletin 6537634 vom 2022-01-04", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-apache-log4j-impact-ibm-spectrum-protect-plus-cve-2021-45105-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Bulletin 6538148 vom 2022-01-05", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-apache-log4j-affect-ibm-websphere-application-server-cve-2021-45105-cve-2021-44832/" }, { "category": "external", "summary": "IBM Security Bulletin 6537640 vom 2022-01-06", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-apache-log4j-affect-ibm-spectrum-protect-for-space-management-cve-2021-45105-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Bulletin 6538396 vom 2022-01-06", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-apache-log4j-impacts-ibm-spectrum-protect-backup-archive-client-and-ibm-spectrum-protect-for-virtual-environments-cve-2021-45105-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Bulletin 6537642 vom 2022-01-06", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-apache-log4j-affect-ibm-spectrum-protect-snapshot-on-windows-cve-2021-45105-and-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Bulletin 6537644 vom 2022-01-07", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-apache-log4j-affect-ibm-spectrum-protect-snapshot-for-vmware-cve-2021-45105-and-cve-2021-45046/" }, { "category": "external", "summary": "JobScheduler Vulnerability Release 1.13.11 vom 2022-01-10", "url": "https://kb.sos-berlin.com/display/PKB/Vulnerability+Release+1.13.11" }, { "category": "external", "summary": "EMC Security Advisory DSA-2021-274 vom 2022-01-09", "url": "https://www.dell.com/support/kbdoc/de-de/000194503/dsa-2021-274-dell-emc-data-domain-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228" }, { "category": "external", "summary": "HPE Security Bulletin HPESBGN04215 rev.10 vom 2022-01-08", "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=67018031\u0026docId=hpesbgn04215en_us" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0044 vom 2022-01-10", "url": "https://access.redhat.com/errata/RHSA-2022:0044" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0042 vom 2022-01-10", "url": "https://access.redhat.com/errata/RHSA-2022:0042" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0043 vom 2022-01-10", "url": "https://access.redhat.com/errata/RHSA-2022:0043" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0047 vom 2022-01-10", "url": "https://access.redhat.com/errata/RHSA-2022:0047" }, { "category": "external", "summary": "IBM Security Bulletin 6539408 vom 2022-01-11", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-apache-log4j-affect-the-ibm-websphere-application-server-and-ibm-security-guardium-key-lifecycle-manager-cve-2021-4104-cve-2021-45046-cve-2021-45105/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5222-1 vom 2022-01-11", "url": "https://ubuntu.com/security/notices/USN-5222-1" }, { "category": "external", "summary": "IBM Security Bulletin 6538896 vom 2022-01-12", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-mq-blockchain-bridge-dependencies-are-vulnerable-to-an-issue-in-apache-log4j-cve-2021-45105/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0026 vom 2022-01-13", "url": "https://access.redhat.com/errata/RHSA-2022:0026" }, { "category": "external", "summary": "JobScheduler Vulnerability Release 2.2.1 vom 2022-01-11", "url": "https://kb.sos-berlin.com/display/PKB/Vulnerability+Release+2.2.1" }, { "category": "external", "summary": "IBM Security Bulletin 6540542 vom 2022-01-14", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-business-automation-workflow-is-vulnerable-to-denial-of-service-and-arbitrary-code-execution-due-to-apache-log4j-cve-2021-45105-and-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Advisory", "url": "https://www.ibm.com/support/pages/node/6541182" }, { "category": "external", "summary": "IBM Security Bulletin 6541258 vom 2022-01-18", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-rational-software-architect-realtime-edition-rsa-rt-is-is-vulnerable-to-arbitrary-code-execution-and-denial-of-service-due-to-apache-log4j-cve-2021-44228-cve-2021-45046-and/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0203 vom 2022-01-20", "url": "https://access.redhat.com/errata/RHSA-2022:0203" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0223 vom 2022-01-21", "url": "https://access.redhat.com/errata/RHSA-2022:0223" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0219 vom 2022-01-21", "url": "https://access.redhat.com/errata/RHSA-2022:0219" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0216 vom 2022-01-20", "url": "https://access.redhat.com/errata/RHSA-2022:0216" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0205 vom 2022-01-20", "url": "https://access.redhat.com/errata/RHSA-2022:0205" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0083 vom 2022-01-20", "url": "https://access.redhat.com/errata/RHSA-2022:0083" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0222 vom 2022-01-21", "url": "https://access.redhat.com/errata/RHSA-2022:0222" }, { "category": "external", "summary": "IBM Security Bulletin 6549764 vom 2022-01-22", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-infosphere-information-server-is-vulnerable-to-denial-of-service-and-arbitrary-code-execution-due-to-apache-log4j-cve-2021-45105-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Bulletin 6550462 vom 2022-01-25", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-insights-is-vulnerable-to-denial-of-service-and-arbitrary-code-execution-due-to-apache-log4j-cve-2021-45105-cve-2021-45046/" }, { "category": "external", "summary": "IBM Security Bulletin 6551118 vom 2022-01-27", "url": "https://www.ibm.com/blogs/psirt/security-bulletinibm-db2-on-openshift-and-ibm-db2-and-db2-warehouse-on-cloud-pak-for-data-is-vulnerable-to-denial-of-service-and-arbitrary-code-execution-due-to-apache/" }, { "category": "external", "summary": "IBM Security Bulletin 6551390 vom 2022-01-28", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-tivoli-network-manager-ip-edition-is-vulnerable-to-denial-of-service-and-arbitrary-code-execution-due-to-apache-log4j-cve-2021-45105-and-cve-2021-45046/" }, { "category": "external", "summary": "EMC Security Advisory DSA-2019-079 vom 2022-01-28", "url": "https://www.dell.com/support/kbdoc/de-de/000194054/dsa-2019-079" }, { "category": "external", "summary": "IBM Security Bulletin 6551310 vom 2022-01-28", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-tivoli-netcool-omnibus-common-integration-libraries-is-vulnerable-to-arbitrary-code-execution-and-denial-of-service-due-to-apache-log4j-cve-2021-44228-cve-2021-45046-cve-2021/" }, { "category": "external", "summary": "IBM Security Bulletin 6552546 vom 2022-02-02", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-tivoli-netcool-omnibus-installation-contains-vulnerable-apache-log4j-code-cve-2021-44832-cve-2021-45046-cve-2021-45105/" }, { "category": "external", "summary": "HCL Article KB0097471 vom 2022-05-18", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0097471" }, { "category": "external", "summary": "IBM Security Bulletin 6565401 vom 2022-03-23", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-big-sql-is-vulnerable-to-arbitrary-code-execution-and-denial-of-service-due-to-apache-log4j-cve-2021-45046-cve-2021-45105/" }, { "category": "external", "summary": "HCL Article KB0096807 vom 2022-03-29", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0096807" }, { "category": "external", "summary": "IBM Security Bulletin 6568843 vom 2022-04-02", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-informix-dynamic-server-in-cloud-pak-for-data-is-vulnerable-to-denial-of-service-and-arbitrary-code-execution-due-to-apache-log4j-cve-2021-45105-cve-2021-45046/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1296 vom 2022-04-11", "url": "https://access.redhat.com/errata/RHSA-2022:1296" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1297 vom 2022-04-11", "url": "https://access.redhat.com/errata/RHSA-2022:1297" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1299 vom 2022-04-11", "url": "https://access.redhat.com/errata/RHSA-2022:1299" }, { "category": "external", "summary": "IBM Security Bulletin 6572685 vom 2022-04-16", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-informix-dynamic-server-is-vulnerable-to-denial-of-service-cve-2021-45105-and-remote-code-execution-cve-2021-45046-due-to-apache-log4j/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1462 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1462" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1469 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1469" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1463 vom 2022-04-20", "url": "https://access.redhat.com/errata/RHSA-2022:1463" }, { "category": "external", "summary": "HCL Article KB0097650 vom 2022-04-23", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0097650" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-001 vom 2022-04-25", "url": "https://downloads.avaya.com/css/P8/documents/101081576" }, { "category": "external", "summary": "HCL Article KB0097787 vom 2022-04-28", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0097787" }, { "category": "external", "summary": "HCL Article KB0099128 vom 2022-07-24", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0099128" }, { "category": "external", "summary": "HCL Article KB0099671 vom 2022-07-24", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0099671" }, { "category": "external", "summary": "HCL Article KB0099131 vom 2022-07-24", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0099131" }, { "category": "external", "summary": "HCL Article KB0099667 vom 2022-08-13", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0099667" }, { "category": "external", "summary": "HCL Article KB0099669 vom 2022-08-13", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0099669" }, { "category": "external", "summary": "HCL Article KB0100505 vom 2022-09-21", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0100505" } ], "source_lang": "en-US", "title": "Apache log4j: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2022-12-11T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:53:59.196+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0811", "initial_release_date": "2021-12-19T23:00:00.000+00:00", "revision_history": [ { "date": "2021-12-19T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-12-20T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Cisco aufgenommen" }, { "date": "2021-12-21T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2021-12-22T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2021-12-23T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von WIBU-SYSTEMS und Amazon aufgenommen" }, { "date": "2021-12-26T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von IBM und Debian aufgenommen" }, { "date": "2021-12-27T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-01-02T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-01-03T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-01-04T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-01-05T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-01-06T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Cisco und IBM aufgenommen" }, { "date": "2022-01-09T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SOS GmbH und Dell aufgenommen" }, { "date": "2022-01-10T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat und IBM aufgenommen" }, { "date": "2022-01-11T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Ubuntu und IBM aufgenommen" }, { "date": "2022-01-12T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-13T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-01-16T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-01-17T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-01-19T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-20T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-23T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-01-24T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-01-26T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-01-27T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von IBM und EMC aufgenommen" }, { "date": "2022-02-01T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-03-22T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-03-29T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2022-04-03T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-04-11T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-18T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2022-04-20T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-24T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2022-04-26T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-04-27T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2022-05-17T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2022-07-24T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2022-08-14T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2022-09-20T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2022-12-11T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "40" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Apache log4j \u003c 2.17.0", "product": { "name": "Apache log4j \u003c 2.17.0", "product_id": "T021377", "product_identification_helper": { "cpe": "cpe:/a:apache:log4j:2.17.0" } } }, { "category": "product_name", "name": "Apache log4j \u003c 2.3.1", "product": { "name": "Apache log4j \u003c 2.3.1", "product_id": "T021413", "product_identification_helper": { "cpe": "cpe:/a:apache:log4j:2.3.1" } } }, { "category": "product_name", "name": "Apache log4j \u003c 2.12.3", "product": { "name": "Apache log4j \u003c 2.12.3", "product_id": "T021414", "product_identification_helper": { "cpe": "cpe:/a:apache:log4j:2.12.3" } } } ], "category": "product_name", "name": "log4j" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya one-X", "product": { "name": "Avaya one-X", "product_id": "1024", "product_identification_helper": { "cpe": "cpe:/a:avaya:one-x:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Cisco Application Policy Infrastructure Controller", "product": { "name": "Cisco Application Policy Infrastructure Controller", "product_id": "778219", "product_identification_helper": { "cpe": "cpe:/a:cisco:application_policy_infrastructure_controller:-" } } }, { "category": "product_name", "name": "Cisco Emergency Responder (ER)", "product": { "name": "Cisco Emergency Responder (ER)", "product_id": "2040", "product_identification_helper": { "cpe": "cpe:/a:cisco:emergency_responder:-" } } }, { "category": "product_name", "name": "Cisco Finesse", "product": { "name": "Cisco Finesse", "product_id": "199167", "product_identification_helper": { "cpe": "cpe:/a:cisco:finesse:-" } } }, { "category": "product_name", "name": "Cisco Firepower", "product": { "name": "Cisco Firepower", "product_id": "T011337", "product_identification_helper": { "cpe": "cpe:/a:cisco:firepower:-" } } }, { "category": "product_name", "name": "Cisco Identity Services Engine (ISE)", "product": { "name": "Cisco Identity Services Engine (ISE)", "product_id": "T000612", "product_identification_helper": { "cpe": "cpe:/a:cisco:identity_services_engine_software:-" } } }, { "category": "product_name", "name": "Cisco Integrated Management Controller", "product": { "name": "Cisco Integrated Management Controller", "product_id": "T014392", "product_identification_helper": { "cpe": "cpe:/a:cisco:integrated_management_controller:-" } } }, { "category": "product_name", "name": "Cisco Network Services Orchestrator", "product": { "name": "Cisco Network Services Orchestrator", "product_id": "T021358", "product_identification_helper": { "cpe": "cpe:/a:cisco:network_services_orchestrator:-" } } }, { "branches": [ { "category": "product_name", "name": "Cisco Nexus Dashboard", "product": { "name": "Cisco Nexus Dashboard", "product_id": "T021249", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus:::dashboard" } } }, { "category": "product_name", "name": "Cisco Nexus Insights", "product": { "name": "Cisco Nexus Insights", "product_id": "T021357", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus:insights" } } } ], "category": "product_name", "name": "Nexus" }, { "category": "product_name", "name": "Cisco SD-WAN vManage", "product": { "name": "Cisco SD-WAN vManage", "product_id": "T018812", "product_identification_helper": { "cpe": "cpe:/a:cisco:sd_wan:vmanage" } } }, { "branches": [ { "category": "product_name", "name": "Cisco Unified Communications Manager (CUCM)", "product": { "name": "Cisco Unified Communications Manager (CUCM)", "product_id": "2142", "product_identification_helper": { "cpe": "cpe:/a:cisco:unified_communications_manager:-" } } }, { "category": "product_name", "name": "Cisco Unified Communications Manager (CUCM) Session Management Edition", "product": { "name": "Cisco Unified Communications Manager (CUCM) Session Management Edition", "product_id": "T016315", "product_identification_helper": { "cpe": "cpe:/a:cisco:unified_communications_manager:session_management_edition" } } } ], "category": "product_name", "name": "Unified Communications Manager (CUCM)" }, { "category": "product_name", "name": "Cisco Unified Communications Manager IM \u0026 Presence Service", "product": { "name": "Cisco Unified Communications Manager IM \u0026 Presence Service", "product_id": "313751", "product_identification_helper": { "cpe": "cpe:/a:cisco:unified_communications_manager_im_and_presence_service:10.5%281%29" } } }, { "branches": [ { "category": "product_name", "name": "Cisco Unified Computing System (UCS)", "product": { "name": "Cisco Unified Computing System (UCS)", "product_id": "163824", "product_identification_helper": { "cpe": "cpe:/h:cisco:unified_computing_system:-" } } }, { "category": "product_name", "name": "Cisco Unified Computing System (UCS) Director", "product": { "name": "Cisco Unified Computing System (UCS) Director", "product_id": "T017032", "product_identification_helper": { "cpe": "cpe:/h:cisco:unified_computing_system:director_6.7.4.1" } } } ], "category": "product_name", "name": "Unified Computing System (UCS)" }, { "category": "product_name", "name": "Cisco Unified Contact Center Enterprise", "product": { "name": "Cisco Unified Contact Center Enterprise", "product_id": "2143", "product_identification_helper": { "cpe": "cpe:/a:cisco:unified_contact_center_enterprise:-" } } }, { "category": "product_name", "name": "Cisco Unified Contact Center Express (UCCX)", "product": { "name": "Cisco Unified Contact Center Express (UCCX)", "product_id": "915286", "product_identification_helper": { "cpe": "cpe:/a:cisco:unified_contact_center_express:-" } } }, { "category": "product_name", "name": "Cisco Unified Intelligence Center", "product": { "name": "Cisco Unified Intelligence Center", "product_id": "T018811", "product_identification_helper": { "cpe": "cpe:/a:cisco:unified_intelligence_center:-" } } }, { "category": "product_name", "name": "Cisco Unity Connection", "product": { "name": "Cisco Unity Connection", "product_id": "T002044", "product_identification_helper": { "cpe": "cpe:/a:cisco:unity_connection:-" } } }, { "category": "product_name", "name": "Cisco Video Surveillance Operations Manager", "product": { "name": "Cisco Video Surveillance Operations Manager", "product_id": "196088", "product_identification_helper": { "cpe": "cpe:/a:cisco:video_surveillance_operations_manager:-" } } }, { "category": "product_name", "name": "Cisco WebEx Workforce Optimization", "product": { "name": "Cisco WebEx Workforce Optimization", "product_id": "T021381", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex:::workforce_optimization" } } }, { "category": "product_name", "name": "Cisco WebEx Meetings Server", "product": { "name": "Cisco WebEx Meetings Server", "product_id": "T001160", "product_identification_helper": { "cpe": "cpe:/a:cisco:webex_meetings_server:-" } } } ], "category": "vendor", "name": "Cisco" }, { "branches": [ { "category": "product_name", "name": "Citrix Systems Virtual Apps and Desktops", "product": { "name": "Citrix Systems Virtual Apps and Desktops", "product_id": "T019523", "product_identification_helper": { "cpe": "cpe:/a:citrix:virtual_apps_and_desktops:-" } } } ], "category": "vendor", "name": "Citrix Systems" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "EMC Data Domain", "product": { "name": "EMC Data Domain", "product_id": "T021496", "product_identification_helper": { "cpe": "cpe:/o:emc:data_domain:-" } } }, { "category": "product_name", "name": "EMC Data Domain OS", "product": { "name": "EMC Data Domain OS", "product_id": "T006099", "product_identification_helper": { "cpe": "cpe:/o:emc:data_domain_os:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "category": "product_name", "name": "HCL Commerce", "product": { "name": "HCL Commerce", "product_id": "T019293", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:-" } } } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow", "product": { "name": "IBM Business Automation Workflow", "product_id": "T019704", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:-" } } }, { "branches": [ { "category": "product_name", "name": "IBM DB2", "product": { "name": "IBM DB2", "product_id": "5104", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:-" } } }, { "category": "product_name", "name": "IBM DB2 BigSQL", "product": { "name": "IBM DB2 BigSQL", "product_id": "T022380", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:bigsql" } } } ], "category": "product_name", "name": "DB2" }, { "category": "product_name", "name": "IBM InfoSphere Information Server", "product": { "name": "IBM InfoSphere Information Server", "product_id": "T019995", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:-" } } }, { "category": "product_name", "name": "IBM MQ Blockchain Bridge", "product": { "name": "IBM MQ Blockchain Bridge", "product_id": "T021543", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:::blockchain_bridge" } } }, { "category": "product_name", "name": "IBM Rational Software Architect", "product": { "name": "IBM Rational Software Architect", "product_id": "T005181", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_software_architect:-" } } }, { "category": "product_name", "name": "IBM SPSS", "product": { "name": "IBM SPSS", "product_id": "T013570", "product_identification_helper": { "cpe": "cpe:/a:ibm:spss:-" } } }, { "category": "product_name", "name": "IBM Security Guardium", "product": { "name": "IBM Security Guardium", "product_id": "T021345", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:-" } } }, { "category": "product_name", "name": "IBM Spectrum Protect", "product": { "name": "IBM Spectrum Protect", "product_id": "T013661", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:-" } } }, { "category": "product_name", "name": "IBM Spectrum Scale", "product": { "name": "IBM Spectrum Scale", "product_id": "T019402", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_scale:-" } } }, { "category": "product_name", "name": "IBM Tivoli Netcool/OMNIbus", "product": { "name": "IBM Tivoli Netcool/OMNIbus", "product_id": "T004181", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_netcool%2fomnibus:-" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager", "product": { "name": "IBM Tivoli Network Manager", "product_id": "T001879", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:3.8" } } }, { "category": "product_name", "name": "IBM WebSphere Application Server", "product": { "name": "IBM WebSphere Application Server", "product_id": "5198", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SOS GmbH JobScheduler", "product": { "name": "SOS GmbH JobScheduler", "product_id": "T021263", "product_identification_helper": { "cpe": "cpe:/a:sos_gmbh:jobscheduler:-" } } } ], "category": "vendor", "name": "SOS GmbH" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T016400", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "category": "product_name", "name": "Wibu-Systems CodeMeter", "product": { "name": "Wibu-Systems CodeMeter", "product_id": "812997", "product_identification_helper": { "cpe": "cpe:/a:wibu:codemeter:-" } } } ], "category": "vendor", "name": "Wibu-Systems" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-45105", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Apache log4j, wenn ein nicht standardm\u00e4\u00dfiges \"Pattern Layout\" innerhalb der Logging-Konfiguration verwendet wird. Eine fehlende Eingabevalidierung kann zu einer unkontrollierten Rekursion in Abh\u00e4ngigkeit von der Log-Eingabe f\u00fchren. Ein Angreifer kann speziell gestaltete Eingaben in einer betroffenen Anwendung verwenden, um diese Rekursion auszul\u00f6sen, die in einem Stack Overflow-Fehler endet, was zu einem Denial of Service-Zustand f\u00fchrt." } ], "product_status": { "known_affected": [ "T001160", "T022380", "67646", "812997", "T016315", "T019293", "T013661", "T017032", "313751", "T019995", "T021358", "T021357", "T014392", "T000612", "T005181", "199167", "398363", "T021496", "T006099", "163824", "T015519", "5198", "T015516", "T011337", "2143", "2142", "T016400", "2040", "T013570", "T001879", "T021345", "T021543", "T019402", "T019523", "2951", "T018811", "1024", "T018812", "T019704", "T021249", "5104", "778219", "T004181", "T021381", "196088", "915286", "T002044", "T021263" ] }, "release_date": "2021-12-19T23:00:00Z", "title": "CVE-2021-45105" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.