vulnerability
Oracle WebLogic: CVE-2017-5645 : Critical Patch Update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Apr 17, 2017 | Apr 3, 2018 | May 27, 2020 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Apr 17, 2017
Added
Apr 3, 2018
Modified
May 27, 2020
Description
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
Solution(s)
oracle-weblogic-apr-2018-cpu-10_3_6_0_0oracle-weblogic-apr-2018-cpu-12_1_3_0_0oracle-weblogic-apr-2018-cpu-12_2_1_2_0oracle-weblogic-apr-2018-cpu-12_2_1_3_0
References
- BID-97702
- CVE-2017-5645
- https://attackerkb.com/topics/CVE-2017-5645
- REDHAT-RHSA-2017:1417
- REDHAT-RHSA-2017:1801
- REDHAT-RHSA-2017:1802
- REDHAT-RHSA-2017:2423
- REDHAT-RHSA-2017:2633
- REDHAT-RHSA-2017:2635
- REDHAT-RHSA-2017:2636
- REDHAT-RHSA-2017:2637
- REDHAT-RHSA-2017:2638
- REDHAT-RHSA-2017:2808
- REDHAT-RHSA-2017:2809
- REDHAT-RHSA-2017:2810
- REDHAT-RHSA-2017:2811
- REDHAT-RHSA-2017:2888
- REDHAT-RHSA-2017:2889
- REDHAT-RHSA-2017:3244
- REDHAT-RHSA-2017:3399
- REDHAT-RHSA-2017:3400
- REDHAT-RHSA-2019:1545
- URL-http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- URL-https://support.oracle.com/rs?type=doc&id=2353306.1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.