APP: Apache Log4j SocketServer Untrusted Deserialization

This signature detects attempts to exploit a known vulnerability against the SocketServer class of Apache Log4j. A successful attack can lead to arbitrary code execution.

Extended Description

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

Affected Products

Oracle mysql_enterprise_monitor

References

CVE: CVE-2019-17571

Short Name
APP:MISC:APACHELOG4J-SKTSVR-RCE
Severity
Major
Recommended
True
Recommended Action
Drop
Category
APP
Keywords
Apache CVE-2019-17571 Deserialization Log4j SocketServer Untrusted
Release Date
02/18/2020
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
Port
TCP/4560
False Positive
Unknown
Vendors

Opensuse

Apache

Oracle

Netapp

Debian

Canonical

CVSS Score

7.5

Found a potential security threat?