Difference between revisions of "Security Announces"

From TaticView
Jump to: navigation, search
(TVCli (command line tool))
 
(4 intermediate revisions by the same user not shown)
Line 8: Line 8:
 
= Security Announces = <!--T:2-->
 
= Security Announces = <!--T:2-->
  
<!--T:3-->
+
== December/2021 Log4J Vulnerabilities == <!--T:3-->
== December/2021 Log4J Vulnerabilities ==
 
  
 
<!--T:4-->
 
<!--T:4-->
Line 19: Line 18:
 
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 CVE-2021-45046]: Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations
 
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 CVE-2021-45046]: Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations
  
=== Servers status ===
+
=== Servers status === <!--T:6-->
 
Our security team quickly applied the corrections to our servers, and all operations are normal
 
Our security team quickly applied the corrections to our servers, and all operations are normal
  
== TVCli ==
+
=== TVCli === <!--T:7-->
We released a update to [[TVCli]]  addressing the the problem. TVCli Version < 1.3.0 are vulnerable.
+
We released a update to [[TVCli]]  addressing the the problem.  
  
You should upgrade to new version as as possible.
+
<!--T:8-->
 +
'''TVCli Version < 1.3.0 are vulnerable.'''
 +
 
 +
<!--T:9-->
 +
You should [[TVCli Download|upgrade]] to new version, as soon as possible.
  
 
</translate>
 
</translate>

Latest revision as of 19:22, 17 January 2022

Other languages:
English • ‎português do Brasil


Security Announces

December/2021 Log4J Vulnerabilities

The following vulnerabilities where addressed by TaticView security team:

  • CVE-2021-44832: Apache Log4j2 vulnerable to RCE via JDBC Appender when attacker controls configuration.
  • CVE-2021-45105: Apache Log4j2 does not always protect from infinite recursion in lookup evaluation
  • CVE-2021-45046: Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations

Servers status

Our security team quickly applied the corrections to our servers, and all operations are normal

TVCli

We released a update to TVCli addressing the the problem.

TVCli Version < 1.3.0 are vulnerable.

You should upgrade to new version, as soon as possible.