Is Log4j 1.2 8 jar vulnerable?

What is the vulnerability of Log4j 1.2 8

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.

What is the vulnerability of Log4j 1.2 jar

JMSAppender, in log4j 1.2 version, is vulnerable to deserialization of untrusted data if the attacker has the 'write' permissions to the log4j configuration.

Which Log4j jars are vulnerable

What versions of Log4j are vulnerableCVE-2021-44228: All Log4j versions from 2.0-beta9 through 2.12. 1, and 2.13. 0 through 2.14. 1 (also includes 2.15. 0-rc1) are vulnerable.CVE-2021-45046: Log4j versions from 2.0-beta9 through 2.15.0.CVE-2021-45105: Log4j versions from 2.0-beta9 to 2.16.0.

Is Log4j 1 vulnerable

Applications using Log4j 1. x are only vulnerable to this attack when they use JNDI in their configuration. A separate CVE (CVE-2021-4104) has been filed for this vulnerability. To mitigate: Audit your logging configuration to ensure it has no JMSAppender configured.

Is Log4j 1.2 end of life

Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. CSM version 6.3.

Does Log4j 1.2 14 have vulnerability

Affected versions of this package are vulnerable to Deserialization of Untrusted Data. JMSSink in all versions of Log4j 1. x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to.

Is Log4j 1.2 12 jar vulnerable

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data.

Is Log4j 2.16 still vulnerable

December 20, 2021

Log4j 2.17 has been released to address a Denial of Service (DoS) vulnerability found in v2. 16 and earlier. Log4j 2.16 and earlier does not always protect from infinite recursion in lookup evaluation, which can lead to DoS attacks. This is considered a High (7.5) vulnerability on the CVSS scale.

What are the differences between Log4j 1 and 2

Community support: Log4j 1. x is not actively maintained, whereas Log4j 2 has an active community where questions are answered, features are added and bugs are fixed. Automatically reload its configuration upon modification without losing log events while reconfiguring.

What is the replacement for Log4j 1.2 17

Initiated by Ceki Gülcü, the original author of Apache log4j 1. x, the reload4j project is a fork of Apache log4j version 1.2. 17 with the goal of fixing pressing security issues. Reload4j is a binary compatible, drop-in replacement for log4j version 1.2.

What is the version Log4j 1.2 17

Apache Log4j » 1.2. 17

License Apache 2.0
Files pom (21 KB) bundle (478 KB) View All
Repositories CentralApache PublicApache ReleasesApache StagingBeDataDrivenHortonworksMulesoftOrekitRedhat GASonatypeSpring Plugins
Ranking #16 in MvnRepository (See Top Artifacts) #3 in Logging Frameworks
Used By 18,289 artifacts

Is Log4j Version 1.2 14 vulnerable

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data.

Is log4j Core 2.14 1 vulnerable

log4j:log4j-core is a logging library for Java. Affected versions of this package are vulnerable to Remote Code Execution (RCE). Apache Log4j2 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints.

What is the replacement for log4j 1.2 17

Initiated by Ceki Gülcü, the original author of Apache log4j 1. x, the reload4j project is a fork of Apache log4j version 1.2. 17 with the goal of fixing pressing security issues. Reload4j is a binary compatible, drop-in replacement for log4j version 1.2.

Is Log4j 1.2 17 jar affected

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2. 17.

Is Log4j Core 2.9 1 jar vulnerable

log4j:log4j-core is a logging library for Java. Affected versions of this package are vulnerable to Denial of Service (DoS). Does not protect against uncontrolled recursion from self-referential lookups.

Is log4j 1.2 end of life

Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. CSM version 6.3.

What replaces log4j 1.2 17 jar

By drop-in, we mean that you can replace log4j. jar with reload4j. jar in your build with no source code changes, no recompilation, nor rebuild being necessary. The reload4j project offers a clear and easy migration path for the thousands of users who have an urgent need to fix vulnerabilities in log4j 1.2.

Is log4j 1.2 17 jar affected

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2. 17.

What is the release date of log4j 1.2 17

Release History

Version Date Description
1.2.17 2012-05-06 Maintenance release
1.2.16 2010-04-06 Maintenance release
1.2.15 2007-08-24 SyslogAppender enhancements, NTEventLogAppender and Maven build.
1.2.14 2006-09-18 AsyncAppender rewrite, Syslog and SMTPAppender enhancements.

What replaces Log4j 1.2 17 jar

By drop-in, we mean that you can replace log4j. jar with reload4j. jar in your build with no source code changes, no recompilation, nor rebuild being necessary. The reload4j project offers a clear and easy migration path for the thousands of users who have an urgent need to fix vulnerabilities in log4j 1.2.