Vulnerability Name: | CVE-2017-5929 (CCN-123503) | ||||||||||||
Assigned: | 2017-03-13 | ||||||||||||
Published: | 2017-03-13 | ||||||||||||
Updated: | 2022-04-18 | ||||||||||||
Summary: | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-502 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-5929 Source: REDHAT Type: Third Party Advisory RHSA-2017:1675 Source: REDHAT Type: Third Party Advisory RHSA-2017:1676 Source: REDHAT Type: Third Party Advisory RHSA-2017:1832 Source: REDHAT Type: Third Party Advisory RHSA-2018:2927 Source: XF Type: UNKNOWN qosch-logback-cve20175929-code-exec(123503) Source: MLIST Type: Mailing List, Third Party Advisory [cassandra-commits] 20191112 [jira] [Updated] (CASSANDRA-15411) [9.8] [CVE-2017-5929] [Cassandra] [2.2.5] Source: MLIST Type: Mailing List, Third Party Advisory [cassandra-commits] 20191112 [jira] [Created] (CASSANDRA-15411) [9.8] [CVE-2017-5929] [Cassandra] [2.2.5] Source: MLIST Type: Mailing List, Third Party Advisory [cassandra-commits] 20191113 [jira] [Created] (CASSANDRA-15421) CVE-2017-5929(QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components.) Source: MLIST Type: Mailing List, Third Party Advisory [cassandra-commits] 20210108 [jira] [Updated] (CASSANDRA-15421) CVE-2017-5929 in 3.11.x (QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components.) Source: MLIST Type: Third Party Advisory, Mailing List [cassandra-commits] 20210111 [jira] [Assigned] (CASSANDRA-15829) Upgrade to logback 1.2.3 to address CVE-2017-5929 Source: MLIST Type: Mailing List, Third Party Advisory [mnemonic-commits] 20201204 [mnemonic] branch master updated: MNEMONIC-553: Fix for CVE-2017-5929 Source: MLIST Type: Third Party Advisory, Mailing List [cassandra-commits] 20210111 [jira] [Commented] (CASSANDRA-15829) Upgrade to logback 1.2.3 to address CVE-2017-5929 Source: MLIST Type: Mailing List, Third Party Advisory [cassandra-commits] 20210108 [jira] [Commented] (CASSANDRA-15829) Upgrade to logback 1.2.3 to address CVE-2017-5929 Source: MLIST Type: Mailing List, Third Party Advisory [cassandra-commits] 20210923 [jira] [Updated] (CASSANDRA-15829) Upgrade to logback 1.2.3 to address CVE-2017-5929 Source: MLIST Type: Mailing List, Third Party Advisory [cassandra-commits] 20210111 [jira] [Updated] (CASSANDRA-15421) CVE-2017-5929 in 3.11.x (QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components.) Source: MLIST Type: Mailing List, Third Party Advisory [brooklyn-dev] 20200420 [GitHub] [brooklyn-server] duncangrant opened a new pull request #1091: Update library versions due to CVEs Source: MLIST Type: Mailing List, Third Party Advisory [cassandra-commits] 20210111 [jira] [Updated] (CASSANDRA-15829) Upgrade to logback 1.2.3 to address CVE-2017-5929 Source: MLIST Type: Mailing List, Third Party Advisory [mnemonic-dev] 20201202 [GitHub] [mnemonic] yzz127 opened a new pull request #152: MNEMONIC-553: Fix for CVE-2017-5929 Source: MLIST Type: Mailing List, Third Party Advisory [cassandra-commits] 20210111 [jira] [Updated] (CASSANDRA-15411) [9.8] [CVE-2017-5929] [Cassandra] [2.2.5] Source: MLIST Type: Mailing List, Third Party Advisory [cassandra-commits] 20210108 [jira] [Updated] (CASSANDRA-15829) Upgrade to logback 1.2.3 to address CVE-2017-5929 Source: MLIST Type: Mailing List, Third Party Advisory [mnemonic-dev] 20201204 [GitHub] [mnemonic] bigdata-memory merged pull request #152: MNEMONIC-553: Fix for CVE-2017-5929 Source: CCN Type: Logback Web site March 16th, 2017, Release of version 1.2.2 Source: CONFIRM Type: Vendor Advisory, Release Notes https://logback.qos.ch/news.html Source: CCN Type: IBM Security Bulletin 6254307 (Cloud Pak System) Vulnerability in Open Source logback used in IBM Cloud Pak System Source: CCN Type: IBM Security Bulletin 6956539 (MobileFirst Platform Foundation) Multiple vulnerabilities found with third-party libraries used by IBM MobileFirst Platform Source: CCN Type: IBM Security Bulletin 7006819 (Spectrum Scale) IBM Spectrum Scale Transparent Cloud Tiering is affected by a vulnerability which can allow an attacker to execute arbitrary code Source: CCN Type: Play Framework Security Advisory Java Deserialization vulnerability in Logback SocketAppender | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |