apache log4j CVE-2017-5645 vulnerability in Apache and Other Products
Published on April 17, 2017

product logo product logo product logo product logo product logo
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2017-5645 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

What is a Marshaling, Unmarshaling Vulnerability?

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

CVE-2017-5645 has been classified to as a Marshaling, Unmarshaling vulnerability or weakness.

Products Associated with CVE-2017-5645

You can be notified by stack.watch whenever vulnerabilities like CVE-2017-5645 are published in these products:


What versions are vulnerable to CVE-2017-5645?