The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Apache Log4j 1.2: code execution via Socket Server Deserialization

Synthesis of the vulnerability 

An attacker can use a vulnerability via Socket Server Deserialization of Apache Log4j 1.2, in order to run code.
Impacted systems: log4j, Debian, DB2 UDB, SnapManager, openSUSE Leap, Oracle Fusion Middleware, Oracle OIT, WebLogic, SUSE Linux Enterprise Desktop, SLES.
Severity of this alert: 2/4.
Creation date: 19/12/2019.
Références of this alert: 6198380, cpuapr2020, CVE-2019-17571, DLA-2065-1, DSA-4686-1, NTAP-20200110-0001, openSUSE-SU-2020:0051-1, SUSE-SU-2020:0053-1, SUSE-SU-2020:0054-1, SUSE-SU-2020:14267-1, VIGILANCE-VUL-31193.

Description of the vulnerability 

An attacker can use a vulnerability via Socket Server Deserialization of Apache Log4j 1.2, in order to run code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This weakness announce impacts software or systems such as log4j, Debian, DB2 UDB, SnapManager, openSUSE Leap, Oracle Fusion Middleware, Oracle OIT, WebLogic, SUSE Linux Enterprise Desktop, SLES.

Our Vigil@nce team determined that the severity of this vulnerability alert is medium.

The trust level is of type confirmed by the editor, with an origin of user shell.

An attacker with a expert ability can exploit this computer threat announce.

Solutions for this threat 

Apache Log4j 1.2: workaround for Socket Server Deserialization.
A workaround is to use Log4j 2.x.

Apache ZooKeeper: version 3.5.7.
The version 3.5.7 is fixed:
  http://zookeeper.apache.org/releases.html

Apache ZooKeeper: version 3.6.1.
The version 3.6.1 is fixed:
  https://zookeeper.apache.org/releases.html

Debian 8-10: new apache-log4j1.2 packages.
New packages are available:
  Debian 8: apache-log4j1.2 1.2.17-5+deb8u1
  Debian 9: apache-log4j1.2 1.2.17-7+deb9u1
  Debian 10: apache-log4j1.2 1.2.17-8+deb10u1

IBM DB2: patch for included libraries.
A patch for each platform for versions 11.1 and 11.5 is indicated in information sources.

openSUSE Leap 15.1: new log4j packages.
New packages are available:
  openSUSE Leap 15.1: log4j 1.2.17-lp151.5.3.1

Oracle Fusion Middleware: CPU of April 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2633852.1

SUSE LE 11: new log4j packages.
New packages are available:
  SUSE LE 11 SP3: log4j 1.2.15-26.32.14.1
  SUSE LE 11 SP4: log4j 1.2.15-26.32.14.1

SUSE LE 12: new log4j packages.
New packages are available:
  SUSE LE 12 SP1: log4j 1.2.15-126.3.1
  SUSE LE 12 SP2: log4j 1.2.15-126.3.1
  SUSE LE 12 SP3: log4j 1.2.15-126.3.1
  SUSE LE 12 SP4: log4j 1.2.15-126.3.1
  SUSE LE 12 SP5: log4j 1.2.15-126.3.1

SUSE LE 15: new log4j packages.
New packages are available:
  SUSE LE 15 RTM: log4j 1.2.17-5.3.1
  SUSE LE 15 SP1: log4j 1.2.17-5.3.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a network vulnerability note. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.