CVE-2019-17571

Source
https://cve.org/CVERecord?id=CVE-2019-17571
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-17571.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-17571
Aliases
Downstream
Related
Published
2019-12-20T17:15:11.893Z
Modified
2026-05-18T05:50:40.830515134Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*"
            ],
            "vendor_product": "apache:log4j",
            "extracted_events": [
                {
                    "last_affected": "1.2.17"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
            ],
            "vendor_product": "canonical:ubuntu_linux",
            "extracted_events": [
                {
                    "last_affected": "18.04"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "debian:debian_linux",
            "extracted_events": [
                {
                    "last_affected": "8.0"
                },
                {
                    "last_affected": "9.0"
                },
                {
                    "last_affected": "10.0"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "vendor_product": "netapp:oncommand_system_manager",
            "cpes": [
                "cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "introduced": "3.0"
                },
                {
                    "last_affected": "3.1.3"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "vendor_product": "opensuse:leap",
            "cpes": [
                "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "15.1"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "vendor_product": "oracle:application_testing_suite",
            "cpes": [
                "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "13.3.0.1"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "vendor_product": "oracle:communications_network_integrity",
            "cpes": [
                "cpe:2.3:a:oracle:communications_network_integrity:*:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "introduced": "7.3.2"
                },
                {
                    "last_affected": "7.3.6"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "vendor_product": "oracle:endeca_information_discovery_studio",
            "cpes": [
                "cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "3.2.0"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:oracle:financial_services_lending_and_leasing:*:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:financial_services_lending_and_leasing:12.5.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "oracle:financial_services_lending_and_leasing",
            "extracted_events": [
                {
                    "introduced": "14.1.0"
                },
                {
                    "last_affected": "14.8.0"
                },
                {
                    "last_affected": "12.5.0"
                }
            ]
        },
        {
            "extracted_events": [
                {
                    "last_affected": "8.0.29"
                }
            ],
            "vendor_product": "oracle:mysql_enterprise_monitor",
            "cpes": [
                "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD"
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*"
            ],
            "vendor_product": "oracle:primavera_gateway",
            "extracted_events": [
                {
                    "introduced": "16.2"
                },
                {
                    "last_affected": "16.2.11"
                },
                {
                    "introduced": "17.12.0"
                },
                {
                    "last_affected": "17.12.7"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "vendor_product": "oracle:rapid_planning",
            "cpes": [
                "cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "12.1"
                },
                {
                    "last_affected": "12.2"
                }
            ]
        },
        {
            "extracted_events": [
                {
                    "last_affected": "19.0"
                }
            ],
            "vendor_product": "oracle:retail_extract_transform_and_load",
            "cpes": [
                "cpe:2.3:a:oracle:retail_extract_transform_and_load:19.0:*:*:*:*:*:*:*"
            ],
            "source": "CPE_FIELD"
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:oracle:retail_service_backbone:14.1:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:retail_service_backbone:15.0:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:retail_service_backbone:16.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "oracle:retail_service_backbone",
            "extracted_events": [
                {
                    "last_affected": "14.1"
                },
                {
                    "last_affected": "15.0"
                },
                {
                    "last_affected": "16.0"
                }
            ]
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
                "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
            ],
            "vendor_product": "oracle:weblogic_server",
            "extracted_events": [
                {
                    "last_affected": "10.3.6.0.0"
                },
                {
                    "last_affected": "12.1.3.0.0"
                },
                {
                    "last_affected": "12.2.1.3.0"
                },
                {
                    "last_affected": "12.2.1.4.0"
                },
                {
                    "last_affected": "14.1.1.0.0"
                }
            ]
        }
    ]
}
References

Affected packages

Git / github.com/apache/bookkeeper

Affected ranges

Type
GIT
Repo
https://github.com/apache/bookkeeper
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "4.14.3"
        }
    ],
    "source": "CPE_FIELD",
    "cpe": "cpe:2.3:a:apache:bookkeeper:*:*:*:*:*:*:*:*"
}

Affected versions

release-4.*
release-4.14.0
release-4.14.1
release-4.14.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-17571.json"