Difference between revisions of "Security Announces"
(→TVCli) |
|||
(2 intermediate revisions by the same user not shown) | |||
Line 8: | Line 8: | ||
= Security Announces = <!--T:2--> | = Security Announces = <!--T:2--> | ||
− | <!--T:3--> | + | == December/2021 Log4J Vulnerabilities == <!--T:3--> |
− | |||
<!--T:4--> | <!--T:4--> | ||
Line 19: | Line 18: | ||
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 CVE-2021-45046]: Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations | * [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 CVE-2021-45046]: Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations | ||
− | === Servers status === | + | === Servers status === <!--T:6--> |
Our security team quickly applied the corrections to our servers, and all operations are normal | Our security team quickly applied the corrections to our servers, and all operations are normal | ||
− | === TVCli === | + | === TVCli === <!--T:7--> |
We released a update to [[TVCli]] addressing the the problem. | We released a update to [[TVCli]] addressing the the problem. | ||
+ | <!--T:8--> | ||
'''TVCli Version < 1.3.0 are vulnerable.''' | '''TVCli Version < 1.3.0 are vulnerable.''' | ||
− | You should upgrade to new version as as possible. | + | <!--T:9--> |
+ | You should [[TVCli Download|upgrade]] to new version, as soon as possible. | ||
</translate> | </translate> |
Latest revision as of 19:22, 17 January 2022
Security Announces
December/2021 Log4J Vulnerabilities
The following vulnerabilities where addressed by TaticView security team:
- CVE-2021-44832: Apache Log4j2 vulnerable to RCE via JDBC Appender when attacker controls configuration.
- CVE-2021-45105: Apache Log4j2 does not always protect from infinite recursion in lookup evaluation
- CVE-2021-45046: Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations
Servers status
Our security team quickly applied the corrections to our servers, and all operations are normal
TVCli
We released a update to TVCli addressing the the problem.
TVCli Version < 1.3.0 are vulnerable.
You should upgrade to new version, as soon as possible.