CVE-2023-26464
Published on: Not Yet Published
Last Modified on: 05/05/2023 08:15:00 PM UTC
Certain versions of Log4j from Apache contain the following vulnerability:
** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested) hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized. This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
- CVE-2023-26464 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
Apache Software Foundation - Apache Log4j version not down converted
CVSS3 Score: 7.5 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
No Description Provided | lists.apache.org text/html |
![]() |
CVE-2023-26464 Apache Log4j Vulnerability in NetApp Products | NetApp Product Security | security.netapp.com text/html |
![]() |
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Apache | Log4j | All | All | All | All |
- cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*:
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-26464 : When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an att… twitter.com/i/web/status/1… | 2023-03-10 14:04:17 |
![]() |
CVE-2023-26464: Apache Log4j 1.x (EOL) allows DoS in Chainsaw and SocketAppender: Posted by Arnout Engelen on Mar 1… twitter.com/i/web/status/1… | 2023-03-10 14:21:33 |
![]() |
CVE-2023-26464 | 2023-03-10 15:38:25 |