Difference between revisions of "Security Announces"

From TaticView
Jump to: navigation, search
(Created page with "<languages/> <translate> <div style="float: right;">__TOC__</div> = Security Announces = == December 2021 Log4J Vulnerabilities The following vulnerabilities where addres...")
 
 
(10 intermediate revisions by the same user not shown)
Line 3: Line 3:
 
<translate>
 
<translate>
  
 +
<!--T:1-->
 
<div style="float: right;">__TOC__</div>
 
<div style="float: right;">__TOC__</div>
  
= Security Announces =
+
= Security Announces = <!--T:2-->
  
== December 2021 Log4J Vulnerabilities
+
== December/2021 Log4J Vulnerabilities == <!--T:3-->
  
 +
<!--T:4-->
 
The following vulnerabilities where addressed by TaticView security team:
 
The following vulnerabilities where addressed by TaticView security team:
  
 +
<!--T:5-->
 
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832 CVE-2021-44832]: Apache Log4j2 vulnerable to RCE via JDBC Appender when attacker controls configuration.
 
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832 CVE-2021-44832]: Apache Log4j2 vulnerable to RCE via JDBC Appender when attacker controls configuration.
 
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105 CVE-2021-45105]: Apache Log4j2 does not always protect from infinite recursion in lookup evaluation
 
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105 CVE-2021-45105]: Apache Log4j2 does not always protect from infinite recursion in lookup evaluation
 
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 CVE-2021-45046]: Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations
 
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 CVE-2021-45046]: Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations
 +
 +
=== Servers status === <!--T:6-->
 +
Our security team quickly applied the corrections to our servers, and all operations are normal
 +
 +
=== TVCli === <!--T:7-->
 +
We released a update to [[TVCli]]  addressing the the problem.
 +
 +
<!--T:8-->
 +
'''TVCli Version < 1.3.0 are vulnerable.'''
 +
 +
<!--T:9-->
 +
You should [[TVCli Download|upgrade]] to new version, as soon as possible.
  
 
</translate>
 
</translate>

Latest revision as of 19:22, 17 January 2022

Other languages:
English • ‎português do Brasil


Security Announces

December/2021 Log4J Vulnerabilities

The following vulnerabilities where addressed by TaticView security team:

  • CVE-2021-44832: Apache Log4j2 vulnerable to RCE via JDBC Appender when attacker controls configuration.
  • CVE-2021-45105: Apache Log4j2 does not always protect from infinite recursion in lookup evaluation
  • CVE-2021-45046: Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations

Servers status

Our security team quickly applied the corrections to our servers, and all operations are normal

TVCli

We released a update to TVCli addressing the the problem.

TVCli Version < 1.3.0 are vulnerable.

You should upgrade to new version, as soon as possible.