Difference between revisions of "Security Announces/en"

From TaticView
Jump to: navigation, search
(Updating to match new version of source page)
 
(Updating to match new version of source page)
Line 6: Line 6:
 
= Security Announces =
 
= Security Announces =
  
== December 2021 Log4J Vulnerabilities
+
== December/2021 Log4J Vulnerabilities ==
  
 
The following vulnerabilities where addressed by TaticView security team:
 
The following vulnerabilities where addressed by TaticView security team:
Line 13: Line 13:
 
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105 CVE-2021-45105]: Apache Log4j2 does not always protect from infinite recursion in lookup evaluation
 
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105 CVE-2021-45105]: Apache Log4j2 does not always protect from infinite recursion in lookup evaluation
 
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 CVE-2021-45046]: Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations
 
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 CVE-2021-45046]: Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations
 +
 +
=== Servers status ===
 +
Our security team quickly applied the corrections to our servers, and all operations are normal
 +
 +
=== TVCli ===
 +
We released a update to [[TVCli]]  addressing the the problem.
 +
 +
'''TVCli Version < 1.3.0 are vulnerable.'''
 +
 +
You should upgrade to new version as as possible.

Revision as of 20:02, 3 January 2022

Other languages:


Security Announces

December/2021 Log4J Vulnerabilities

The following vulnerabilities where addressed by TaticView security team:

  • CVE-2021-44832: Apache Log4j2 vulnerable to RCE via JDBC Appender when attacker controls configuration.
  • CVE-2021-45105: Apache Log4j2 does not always protect from infinite recursion in lookup evaluation
  • CVE-2021-45046: Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations

Servers status

Our security team quickly applied the corrections to our servers, and all operations are normal

TVCli

We released a update to TVCli addressing the the problem.

TVCli Version < 1.3.0 are vulnerable.

You should upgrade to new version as as possible.