Article 5T38T Patch fixing critical Log4J 0-day has its own vulnerability that’s under exploit

Patch fixing critical Log4J 0-day has its own vulnerability that’s under exploit

by
Dan Goodin
from Ars Technica - All content on (#5T38T)
Paris_Tuileries_Garden_Facepalm_statue-8

Enlarge (credit: Wikimedia Commons/Alex E. Proimos)

Last Thursday, the world learned of an in-the-wild exploitation of a critical code-execution zero-day in Log4J, a logging utility used by just about every cloud service and enterprise network on the planet. Open source developers quickly released an update that patched the flaw and urged all users to install it immediately.

Now, researchers are reporting that there are at least two vulnerabilities in the patch, released as Log4J 2.15.0, and that attackers are actively exploiting one or both of them against real-world targets who have already applied the update. The researchers are urging organizations to install a new patch, released as version 2.16.0, as soon as possible to fix the vulnerability, which is tracked as CVE-2021-45046.

The earlier fix, researchers said on late Tuesday, was incomplete in certain non-default configurations" and made it possible for attackers to perform denial-of-service attacks, which typically make it easy to take vulnerable services completely offline until victims reboot their servers or take other actions. Version 2.16.0 "fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default," according to the above-linked vulnerability notice.

Read 5 remaining paragraphs | Comments

index?i=NzlLgkKRbGw:3mxC-gRPsjo:V_sGLiPB index?i=NzlLgkKRbGw:3mxC-gRPsjo:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments