What is the vulnerability of Log4j 1.2 17?

Does Log4j 1.2 17 have vulnerability

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data.

Is Log4j 1.2 vulnerable

JMSAppender, in log4j 1.2 version, is vulnerable to deserialization of untrusted data if the attacker has the 'write' permissions to the log4j configuration.

What is the version Log4j 1.2 17

Apache Log4j » 1.2. 17

License Apache 2.0
Files pom (21 KB) bundle (478 KB) View All
Repositories CentralApache PublicApache ReleasesApache StagingBeDataDrivenHortonworksMulesoftOrekitRedhat GASonatypeSpring Plugins
Ranking #16 in MvnRepository (See Top Artifacts) #3 in Logging Frameworks
Used By 18,289 artifacts

What is the vulnerability of Log4j 1.2 15

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.

Is Log4j 1.2 end of life

Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. CSM version 6.3.

What is the release date of Log4j 1.2 17

Release History

Version Date Description
1.2.17 2012-05-06 Maintenance release
1.2.16 2010-04-06 Maintenance release
1.2.15 2007-08-24 SyslogAppender enhancements, NTEventLogAppender and Maven build.
1.2.14 2006-09-18 AsyncAppender rewrite, Syslog and SMTPAppender enhancements.

Does Log4j vulnerability affect Log4j 1

Log4j 1.

x are only vulnerable to this attack when they use JNDI in their configuration. A separate CVE (CVE-2021-4104) has been filed for this vulnerability. To mitigate: Audit your logging configuration to ensure it has no JMSAppender configured. Log4j 1.

What replaces Log4j 1.2 17 jar

By drop-in, we mean that you can replace log4j. jar with reload4j. jar in your build with no source code changes, no recompilation, nor rebuild being necessary. The reload4j project offers a clear and easy migration path for the thousands of users who have an urgent need to fix vulnerabilities in log4j 1.2.

When was Log4j 1.2 17 released

Release History

Version Date Description
1.2.17 2012-05-06 Maintenance release
1.2.16 2010-04-06 Maintenance release
1.2.15 2007-08-24 SyslogAppender enhancements, NTEventLogAppender and Maven build.
1.2.14 2006-09-18 AsyncAppender rewrite, Syslog and SMTPAppender enhancements.

Which Log4j version has vulnerabilities

Technical Details. The CVE-2021-44228 RCE vulnerability—affecting Apache's Log4j library, versions 2.0-beta9 to 2.14. 1—exists in the action the Java Naming and Directory Interface (JNDI) takes to resolve variables.

Is Log4j 1 version vulnerable

x. JMSSink in Log4j 1. x is vulnerable to deserialization of untrusted data. This flaw allows a remote attacker to execute code on the server if the deployed application is configured to use JMSSink and to the attacker's JNDI LDAP endpoint.

What is the vulnerability of Log4j 1.2 12

Affected versions of this package are vulnerable to Man-in-the-Middle (MitM). Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.

What is the release date of log4j 1.2 17

Release History

Version Date Description
1.2.17 2012-05-06 Maintenance release
1.2.16 2010-04-06 Maintenance release
1.2.15 2007-08-24 SyslogAppender enhancements, NTEventLogAppender and Maven build.
1.2.14 2006-09-18 AsyncAppender rewrite, Syslog and SMTPAppender enhancements.

Which log4j version has vulnerabilities

Technical Details. The CVE-2021-44228 RCE vulnerability—affecting Apache's Log4j library, versions 2.0-beta9 to 2.14. 1—exists in the action the Java Naming and Directory Interface (JNDI) takes to resolve variables.

Is Log4j 2.17 1 safe

1 can probably wait. A number of security professionals say that the latest vulnerability in Apache Log4j, disclosed on Tuesday, does not pose an increased security risk for the majority of organizations. As a result, for many organizations that have already patched to version 2.17.

Is 1.18 1 safe from Log4j

Is My Server Safe All servers running 1.18. 1 and above are completely safe.

What versions of Log4j 1 are vulnerable

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2. 17.

What are the differences between Log4j 1 and 2

Community support: Log4j 1. x is not actively maintained, whereas Log4j 2 has an active community where questions are answered, features are added and bugs are fixed. Automatically reload its configuration upon modification without losing log events while reconfiguring.