Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Always draw your curves, then plot your reading.


computers / comp.os.vms / Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

SubjectAuthor
* Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Stephen Hoffman
+* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|+- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|+- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Dennis Boone
|+* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Craig A. Berry
||+- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
||`* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Stephen Hoffman
|| +* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|| |`* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Craig A. Berry
|| | `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|| |  `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Simon Clubley
|| |   +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Bill Gunshannon
|| |   `- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|| `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
||  +* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Jim
||  |`* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228, CVE-2021-45046Stephen Hoffman
||  | `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228,Arne Vajhøj
||  |  `- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228,Arne Vajhøj
||  `- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Simon Clubley
|`* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Bill Gunshannon
| `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Dave Froble
|  `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Bill Gunshannon
|   `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228David Turner
|    +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228, CVE-2021-45046Stephen Hoffman
|    `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|     `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228David Turner
|      +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|      `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Stephen Hoffman
|       `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228David Turner
|        +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|        +* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Dennis Boone
|        |`- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Simon Clubley
|        +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Stephen Hoffman
|        +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Phillip Helbig (undress to reply
|        `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Bill Gunshannon
|         `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228David Turner
|          +* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Craig A. Berry
|          |+* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|          ||`* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|          || `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Simon Clubley
|          ||  `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|          ||   `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Simon Clubley
|          ||    `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|          ||     `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Simon Clubley
|          ||      `- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|          |`- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Stephen Hoffman
|          `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228George Cornelius
|           `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|            `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228John Reagan
|             +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|             +* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Grant Taylor
|             |+- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|             |`- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228John Reagan
|             `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Phillip Helbig (undress to reply
|              `- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
`- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Steven Schweda

Pages:123
Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<sp8cvo$6dt$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19279&group=comp.os.vms#19279

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Mon, 13 Dec 2021 16:12:24 -0500
Organization: HoffmanLabs LLC
Lines: 33
Message-ID: <sp8cvo$6dt$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="0ac94c8aca4e0020e7b4ca49c02aaaad";
logging-data="6589"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+RqxIQJQzERmj091X/aPYT5bLNUGBOWVE="
User-Agent: Unison/2.2
Cancel-Lock: sha1:wh3nA198DyDiz4yYLivcSfbojCI=
 by: Stephen Hoffman - Mon, 13 Dec 2021 21:12 UTC

Java and log4j / log4shell (CVE-2021-44228) remote command execution
vulnerability

intro: https://www.lawfareblog.com/whats-deal-log4shell-security-nightmare

Base OpenVMS itself does not include Java, though add-on apps and
layered products can have dependencies and can install Java.

If you have Java installed anywhere on OpenVMS (try DIRECTORY
ddcu:[*...]JAVA*, etc), you will need to evaluate your configuration in
more detail.

You'll want to evaluate other components and services around your
servers, as well.

List of possibly-effected services and apps:
https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#file-20211210-tlp-white_log4j-md

Reportedly, all versions of Java are vulnerable when log4i is present
and reachable, and exploits are active and under development.

It appears there are efforts underway to create worms using this
vulnerability, as well.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61b7f8b8$0$697$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19288&group=comp.os.vms#19288

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Mon, 13 Dec 2021 20:51:48 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <sp8cvo$6dt$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 70
Message-ID: <61b7f8b8$0$697$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 9642360f.news.sunsite.dk
X-Trace: 1639446712 news.sunsite.dk 697 arne@vajhoej.dk/68.9.63.232:61121
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Tue, 14 Dec 2021 01:51 UTC

On 12/13/2021 4:12 PM, Stephen Hoffman wrote:
> Java and log4j / log4shell (CVE-2021-44228) remote command execution
> vulnerability
>
> intro: https://www.lawfareblog.com/whats-deal-log4shell-security-nightmare
>
> Base OpenVMS itself does not include Java, though add-on apps and
> layered products can have dependencies and can install Java.
>
> If you have Java installed anywhere on OpenVMS (try DIRECTORY
> ddcu:[*...]JAVA*, etc), you will need to evaluate your configuration in
> more detail.
>
> You'll want to evaluate other components and services around your
> servers, as well.
>
> List of possibly-effected services and apps:
> https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#file-20211210-tlp-white_log4j-md
>
> Reportedly, all versions of Java are vulnerable when log4i is present
> and reachable, and exploits are active and under development.
>
> It appears there are efforts underway to create worms using this
> vulnerability, as well.

"all versions of Java are vulnerable when log4j is present and reachable"

is a funny description.

It is a vulnerability for all running Java applications using
log4j 2.0 - 2.14.1 that logs user input.

That is serious. A very large portion of Java server applications
(think 50% magnitude!) use log4j and it seems likely that most of
them have potential for logging user input (user input is important
when troubleshooting).

The version of Java does not impact a bug in log4j more than
the version of C compiler impact a buffer overrun in a C library.

Note that log4j 2.x does not run on VMS Alpha due to too old Java
version (2.0 - 2.3 requires Java 6, 2.4 - 2.12.1 requires Java 7 and
2.13 and newer requires Java 8).

And log4j 1.x is not vulnerable to this bug. But it is out of
support and has other vulnerabilities, so it is not a good
version to be on.

But anybody running a Java application on Itanium that uses
log4j 2.x better upgrade to 2.15 or newer (latest as of today
is 2.16).

To check:

$ dir [whereever...]log4j-core-2.*.jar

should reveal any log4j 2.x present ion that tree.

Every system manager would (hopefully) know whether Java
is installed or not - but very few will know offhand
which applications use log4j, so you better check!!

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61b7f945$0$697$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19289&group=comp.os.vms#19289

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.swapon.de!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Mon, 13 Dec 2021 20:54:14 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <61b7f8b8$0$697$14726298@news.sunsite.dk>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 19
Message-ID: <61b7f945$0$697$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 9642360f.news.sunsite.dk
X-Trace: 1639446853 news.sunsite.dk 697 arne@vajhoej.dk/68.9.63.232:61121
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Tue, 14 Dec 2021 01:54 UTC

On 12/13/2021 8:51 PM, Arne Vajhøj wrote:
> To check:
>
> $ dir [whereever...]log4j-core-2.*.jar
>
> should reveal any log4j 2.x present ion that tree.

Maybe better:

> $ dir [whereever...]log4j-core-2*.jar

just in case it is installed on an ODS-2 disk with _ instead of
period.

Also look out for fatjars which could hide its presence.

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<7audnZBZDvhkiSX8nZ2dnUU7-YOdnZ2d@giganews.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19293&group=comp.os.vms#19293

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!buffer2.nntp.dca1.giganews.com!buffer1.nntp.dca1.giganews.com!news.giganews.com.POSTED!not-for-mail
NNTP-Posting-Date: Mon, 13 Dec 2021 21:52:25 -0600
Sender: Dennis Boone <drb@yagi.h-net.org>
From: drb...@ihatespam.msu.edu (Dennis Boone)
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk>
User-Agent: tin/2.4.5-20201224 ("Glen Albyn") (FreeBSD/12.2-RELEASE-p7 (amd64))
Message-ID: <7audnZBZDvhkiSX8nZ2dnUU7-YOdnZ2d@giganews.com>
Date: Mon, 13 Dec 2021 21:52:25 -0600
Lines: 5
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-vgzsqGgXVBKcRviCCLgV9CEfhKdwYGdk/qFSk5/iBEhDqayRQQwqEPh5OTfxGTIgYXHP1IZ9HQ5g88b!3s9IaheRnyavcBtr7Spp/n031WMb9iGri/umM8JxoBMOKlu54gcgI4bziF62XZ/QuIJWjcs=
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 1131
 by: Dennis Boone - Tue, 14 Dec 2021 03:52 UTC

> (think 50% magnitude!)

Optimists are so cute.

De

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spa6fl$1ph$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19299&group=comp.os.vms#19299

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: craigbe...@nospam.mac.com (Craig A. Berry)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Tue, 14 Dec 2021 07:33:40 -0600
Organization: A noiseless patient Spider
Lines: 30
Message-ID: <spa6fl$1ph$1@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 14 Dec 2021 13:33:41 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="ce5a5f5a4ade6691eb958bf83255dfe1";
logging-data="1841"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+K/KpdOCIxMf9Q8WvwzaIDywVJ81+hiVc="
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.4.0
Cancel-Lock: sha1:4+mxIM0Mz0KNrG2t+w7kzFSL3ac=
In-Reply-To: <61b7f8b8$0$697$14726298@news.sunsite.dk>
Content-Language: en-US
 by: Craig A. Berry - Tue, 14 Dec 2021 13:33 UTC

On 12/13/21 7:51 PM, Arne Vajhøj wrote:
> On 12/13/2021 4:12 PM, Stephen Hoffman wrote:

> The version of Java does not impact a bug in log4j more than
> the version of C compiler impact a buffer overrun in a C library.

Not true. From <https://www.openwall.com/lists/oss-security/2021/12/10/1>:

---
Java 8u121 (see
https://www.oracle.com/java/technologies/javase/8u121-relnotes.html)
protects against remote code execution by defaulting
"com.sun.jndi.rmi.object.trustURLCodebase" and
"com.sun.jndi.cosnaming.object.trustURLCodebase" to "false".
---

So an up-to-date Java (currently I think 1.8.0_312-b07 for Java 8)
mitigates (some of) the mayhem that can be caused by the vulnerability.
Unless I missed one, the latest release from VSI is 1.8.0_222-b05, so
people using Java 8 on VMS should consider getting that if they are
using any older release of Java 8, including, IIRC, any release from HPE.

But also note per this:

<https://www.openwall.com/lists/oss-security/2021/12/10/2>

that an updated Java protects against only one of several remote code
execution vectors, so it's far from a complete fix, but the Java version
certainly does impact the severity of the bug.

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61b8a320$0$701$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19300&group=comp.os.vms#19300

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Tue, 14 Dec 2021 08:58:56 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <spa6fl$1ph$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 39
Message-ID: <61b8a320$0$701$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 5d82ee6f.news.sunsite.dk
X-Trace: 1639490337 news.sunsite.dk 701 arne@vajhoej.dk/68.9.63.232:52597
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Tue, 14 Dec 2021 13:58 UTC

On 12/14/2021 8:33 AM, Craig A. Berry wrote:
> On 12/13/21 7:51 PM, Arne Vajhøj wrote:
>> The version of Java does not impact a bug in log4j more than
>> the version of C compiler impact a buffer overrun in a C library.
>
> Not true. From <https://www.openwall.com/lists/oss-security/2021/12/10/1>:
>
> ---
> Java 8u121 (see
> https://www.oracle.com/java/technologies/javase/8u121-relnotes.html)
> protects against remote code execution by defaulting
> "com.sun.jndi.rmi.object.trustURLCodebase" and
> "com.sun.jndi.cosnaming.object.trustURLCodebase" to "false".
> ---
>
> So an up-to-date Java (currently I think 1.8.0_312-b07 for Java 8)
> mitigates (some of) the mayhem that can be caused by the vulnerability.
> Unless I missed one, the latest release from VSI is 1.8.0_222-b05, so
> people using Java 8 on VMS should consider getting that if they are
> using any older release of Java 8, including, IIRC, any release from HPE.
>
> But also note per this:
>
> <https://www.openwall.com/lists/oss-security/2021/12/10/2>
>
> that an updated Java protects against only one of several remote code
> execution vectors, so it's far from a complete fix, but the Java version
> certainly does impact the severity of the bug.

Ah. I stand corrected.

I actually did know that 8u121 did get some of the 9
deserialization protection features backported.

But I did not realize that it would help with this one.

That is good. Most Java 8 users should be way above u121.

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<j1rn0kF83l3U1@mid.individual.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19302&group=comp.os.vms#19302

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: bill.gun...@gmail.com (Bill Gunshannon)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Tue, 14 Dec 2021 09:11:32 -0500
Lines: 17
Message-ID: <j1rn0kF83l3U1@mid.individual.net>
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net 64osDzsxNjH1dp2se3itbAyudV6TdKKhHn/ucaeIUnRfedVKgr
Cancel-Lock: sha1:4L0LlqfJ67B+W30rjnmeBtDVhsk=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.14.0
In-Reply-To: <61b7f8b8$0$697$14726298@news.sunsite.dk>
Content-Language: en-US
 by: Bill Gunshannon - Tue, 14 Dec 2021 14:11 UTC

On 12/13/21 8:51 PM, Arne Vajhøj wrote:
>

....

> The version of Java does not impact a bug in log4j more than
> the version of C compiler impact a buffer overrun in a C library.

We keep hearing this mantra over and over. If it really is
such a problem why has no one ever bothered to write a new
library keeping the original APIs while internally removing
the overrun problem? Oh wait, someone did. Back in the early
80's. On the PDP-11. For all the DEC OSes and Ultrix-11
and Version 7 Unix. And there was even a version for the VAX.
How did that work out?

bill

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spahb8$k63$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19311&group=comp.os.vms#19311

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Tue, 14 Dec 2021 11:39:04 -0500
Organization: HoffmanLabs LLC
Lines: 27
Message-ID: <spahb8$k63$1@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="e625ceca6e81c2ac7ae123daa34da68b";
logging-data="20675"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+YgY93SOWbBc5uwblMdlMqvfFIn+tutAI="
User-Agent: Unison/2.2
Cancel-Lock: sha1:O+TgXm0ngfdoQvSyuKfL/v5HgRM=
 by: Stephen Hoffman - Tue, 14 Dec 2021 16:39 UTC

On 2021-12-14 13:33:40 +0000, Craig A. Berry said:

> So an up-to-date Java (currently I think 1.8.0_312-b07 for Java 8)
> mitigates (some of) the mayhem that can be caused by the vulnerability.
> Unless I missed one, the latest release from VSI is 1.8.0_222-b05, so
> people using Java 8 on VMS should consider getting that if they are
> using any older release of Java 8, including, IIRC, any release from
> HPE.

Reports that all versions of Java are vulnerable to exploitation when
log4j is accessible. Early reports that Java 8 and newer were not
vulnerable were later found incorrect.

There are mitigations posted, though some of those are seemingly now
getting bypassed.

There's ransomware active now, too.

HPE has indicated that 3PAR and some other products are vulnerable to
this mess, and has posted a list of not-vulnerable products.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61b8cb92$0$701$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19313&group=comp.os.vms#19313

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Tue, 14 Dec 2021 11:51:25 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me>
<spahb8$k63$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <spahb8$k63$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 26
Message-ID: <61b8cb92$0$701$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 0d1b289c.news.sunsite.dk
X-Trace: 1639500690 news.sunsite.dk 701 arne@vajhoej.dk/68.9.63.232:59151
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Tue, 14 Dec 2021 16:51 UTC

On 12/14/2021 11:39 AM, Stephen Hoffman wrote:
> On 2021-12-14 13:33:40 +0000, Craig A. Berry said:
>
>> So an up-to-date Java (currently I think 1.8.0_312-b07 for Java 8)
>> mitigates (some of) the mayhem that can be caused by the
>> vulnerability. Unless I missed one, the latest release from VSI is
>> 1.8.0_222-b05, so people using Java 8 on VMS should consider getting
>> that if they are using any older release of Java 8, including, IIRC,
>> any release from HPE.
>
> Reports that all versions of Java are vulnerable to exploitation when
> log4j is accessible.

"accessible"

Why not just say "used".

> Early reports that Java 8 and newer were not
> vulnerable were later found incorrect.

So you are saying that the deserialization protections done in 9 and
backported to 8u121 are not enough to prevent this vulnerability?

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spakek$d18$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19321&group=comp.os.vms#19321

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Tue, 14 Dec 2021 12:31:52 -0500
Organization: A noiseless patient Spider
Lines: 35
Message-ID: <spakek$d18$1@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <j1rn0kF83l3U1@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 14 Dec 2021 17:32:04 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="0eb431149baab95aa7cae7c04be5e48a";
logging-data="13352"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/OH5mzVxSNfcyxJ2aZl6X75dc+ZDuk7Sk="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:a7fGLha8ySNks26odGvw6tI6J1A=
In-Reply-To: <j1rn0kF83l3U1@mid.individual.net>
 by: Dave Froble - Tue, 14 Dec 2021 17:31 UTC

On 12/14/2021 9:11 AM, Bill Gunshannon wrote:
> On 12/13/21 8:51 PM, Arne Vajhøj wrote:
>>
>
> ...
>
>> The version of Java does not impact a bug in log4j more than
>> the version of C compiler impact a buffer overrun in a C library.
>
> We keep hearing this mantra over and over. If it really is
> such a problem why has no one ever bothered to write a new
> library keeping the original APIs while internally removing
> the overrun problem? Oh wait, someone did. Back in the early
> 80's. On the PDP-11. For all the DEC OSes and Ultrix-11
> and Version 7 Unix. And there was even a version for the VAX.
> How did that work out?
>
> bill

Way too many people don't really care about security ... until it bites them on
the ass. Then they expect a law to be passed that will protect them. As if the
hackers really care about laws.

One moment I'll never forget. I was telling a customer that it would be a very
bad idea for them to store their customer's data, bank account, credit card
info, and such in plain text on a IIS server. The response was "why not,
everyone else does". And they ignored my warning and did just that. Don't know
the result, the business relationship didn't last much longer.

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<j1s3acFaf5iU2@mid.individual.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19324&group=comp.os.vms#19324

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.szaf.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: bill.gun...@gmail.com (Bill Gunshannon)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Tue, 14 Dec 2021 12:41:32 -0500
Lines: 37
Message-ID: <j1s3acFaf5iU2@mid.individual.net>
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <j1rn0kF83l3U1@mid.individual.net>
<spakek$d18$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net b6K3ujtR5j9BIw0uqd9Krw0v5tjoT5U6Byl0OvxTmhtq4YW8o0
Cancel-Lock: sha1:GOHzYgGsa1IpynYNOZdHicD0Aik=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.14.0
In-Reply-To: <spakek$d18$1@dont-email.me>
Content-Language: en-US
 by: Bill Gunshannon - Tue, 14 Dec 2021 17:41 UTC

On 12/14/21 12:31 PM, Dave Froble wrote:
> On 12/14/2021 9:11 AM, Bill Gunshannon wrote:
>> On 12/13/21 8:51 PM, Arne Vajhøj wrote:
>>>
>>
>> ...
>>
>>> The version of Java does not impact a bug in log4j more than
>>> the version of C compiler impact a buffer overrun in a C library.
>>
>> We keep hearing this mantra over and over.  If it really is
>> such a problem why has no one ever bothered to write a new
>> library keeping the original APIs while internally removing
>> the overrun problem?  Oh wait, someone did. Back in the early
>> 80's.  On the PDP-11.  For all the DEC OSes and Ultrix-11
>> and Version 7 Unix.  And there was even a version for the VAX.
>> How did that work out?
>>
>> bill
>
> Way too many people don't really care about security ... until it bites
> them on the ass.  Then they expect a law to be passed that will protect
> them.  As if the hackers really care about laws.
>
> One moment I'll never forget.  I was telling a customer that it would be
> a very bad idea for them to store their customer's data, bank account,
> credit card info, and such in plain text on a IIS server.  The response
> was "why not, everyone else does".  And they ignored my warning and did
> just that.  Don't know the result, the business relationship didn't last
> much longer.
>

And then you have the cloud. Take all your data and place it in the
hands of someone you have no reason to trust.

bill

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spal46$hji$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19325&group=comp.os.vms#19325

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: craigbe...@nospam.mac.com (Craig A. Berry)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Tue, 14 Dec 2021 11:43:32 -0600
Organization: A noiseless patient Spider
Lines: 15
Message-ID: <spal46$hji$1@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me>
<spahb8$k63$1@dont-email.me> <61b8cb92$0$701$14726298@news.sunsite.dk>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 14 Dec 2021 17:43:34 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="ce5a5f5a4ade6691eb958bf83255dfe1";
logging-data="18034"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18inUCies+LTLGd7NVTLlPMBX+/RP3KFIs="
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.4.0
Cancel-Lock: sha1:9asdwtLc9DW3PmVmEj1j5wRIf/I=
In-Reply-To: <61b8cb92$0$701$14726298@news.sunsite.dk>
Content-Language: en-US
 by: Craig A. Berry - Tue, 14 Dec 2021 17:43 UTC

On 12/14/21 10:51 AM, Arne Vajhøj wrote:
> On 12/14/2021 11:39 AM, Stephen Hoffman wrote:

>> Early reports that Java 8 and newer were
>> not vulnerable were later found incorrect.
>
> So you are saying that the deserialization protections done in 9 and
> backported to 8u121 are not enough to prevent this vulnerability?

Those protections block one of several deserialization mechanisms. It
helps a little for what I understand to be the easiest way to execute
remote code. But we're way beyond what's easiest for the state actors
and others who are investing a lot of resources into exploiting this in
the wild. So do upgrade Java. But don't stop there.

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61b8dcd4$0$705$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19329&group=comp.os.vms#19329

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!feeder5.feed.usenet.farm!feeder1.feed.usenet.farm!feed.usenet.farm!feeder.usenetexpress.com!tr1.eu1.usenetexpress.com!nntp.speedium.network!feeder01!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Tue, 14 Dec 2021 13:05:08 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me> <spahb8$k63$1@dont-email.me> <61b8cb92$0$701$14726298@news.sunsite.dk> <spal46$hji$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <spal46$hji$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 22
Message-ID: <61b8dcd4$0$705$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 33a95e26.news.sunsite.dk
X-Trace: 1639505109 news.sunsite.dk 705 arne@vajhoej.dk/68.9.63.232:60870
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Tue, 14 Dec 2021 18:05 UTC

On 12/14/2021 12:43 PM, Craig A. Berry wrote:
> On 12/14/21 10:51 AM, Arne Vajhøj wrote:
>> On 12/14/2021 11:39 AM, Stephen Hoffman wrote:
>>>  Early reports that Java 8 and newer were not vulnerable were later
>>> found incorrect.
>>
>> So you are saying that the deserialization protections done in 9 and
>> backported to 8u121 are not enough to prevent this vulnerability?
>
> Those protections block one of several deserialization mechanisms.  It
> helps a little for what I understand to be the easiest way to execute
> remote code.  But we're way beyond what's easiest for the state actors
> and others who are investing a lot of resources into exploiting this in
> the wild.  So do upgrade Java. But don't stop there.

The best obviously is to upgrade log4j.

Nobody needs that feature causing the vulnerability (obviously
except whoever introduced it).

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61b8f1b3$0$695$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19333&group=comp.os.vms#19333

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Tue, 14 Dec 2021 14:34:06 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me>
<spahb8$k63$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <spahb8$k63$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 12
Message-ID: <61b8f1b3$0$695$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 2d94810b.news.sunsite.dk
X-Trace: 1639510451 news.sunsite.dk 695 arne@vajhoej.dk/68.9.63.232:65151
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Tue, 14 Dec 2021 19:34 UTC

On 12/14/2021 11:39 AM, Stephen Hoffman wrote:
> HPE has indicated that 3PAR and some other products are vulnerable to
> this mess,

Which is a pretty good indication of how big the problem is.

3PAR is not exactly what one assocoate with a Java server.

Some security guy was out in the medias today and say that they expect
it to take 2 years before everyone has patched.

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<9efe3b1d-0dab-494e-9acb-fdef8352afb1n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19334&group=comp.os.vms#19334

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:620a:3187:: with SMTP id bi7mr6212255qkb.534.1639511785461;
Tue, 14 Dec 2021 11:56:25 -0800 (PST)
X-Received: by 2002:a05:620a:2955:: with SMTP id n21mr5919166qkp.641.1639511785275;
Tue, 14 Dec 2021 11:56:25 -0800 (PST)
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Tue, 14 Dec 2021 11:56:24 -0800 (PST)
In-Reply-To: <61b8f1b3$0$695$14726298@news.sunsite.dk>
Injection-Info: google-groups.googlegroups.com; posting-host=204.115.183.4; posting-account=Cx45xwoAAAD0NLqIo3_yGuVPeDAcfc14
NNTP-Posting-Host: 204.115.183.4
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk>
<spa6fl$1ph$1@dont-email.me> <spahb8$k63$1@dont-email.me> <61b8f1b3$0$695$14726298@news.sunsite.dk>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <9efe3b1d-0dab-494e-9acb-fdef8352afb1n@googlegroups.com>
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
From: mckinn...@leidos.com (Jim)
Injection-Date: Tue, 14 Dec 2021 19:56:25 +0000
Content-Type: text/plain; charset="UTF-8"
Lines: 8
 by: Jim - Tue, 14 Dec 2021 19:56 UTC

On 12/14/2021 11:39 AM, Stephen Hoffman wrote:
> HPE has indicated that 3PAR and some other products are vulnerable to

Seems HPE now reporting that the 3PAR StorServ is not vulnerable.

https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00120086en_us

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spatrp$8ji$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19335&group=comp.os.vms#19335

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Tue, 14 Dec 2021 20:12:41 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <spatrp$8ji$1@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me> <spahb8$k63$1@dont-email.me> <61b8cb92$0$701$14726298@news.sunsite.dk> <spal46$hji$1@dont-email.me> <61b8dcd4$0$705$14726298@news.sunsite.dk>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 14 Dec 2021 20:12:41 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="051ce90244940ae52d472c01051d6c77";
logging-data="8818"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+ccWlcGGi6iiO7AxN4HwDB7sGRqy19Wlg="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:mNW0fbRHrGDLcX+IljY0ksBWHOE=
 by: Simon Clubley - Tue, 14 Dec 2021 20:12 UTC

On 2021-12-14, Arne Vajhøj <arne@vajhoej.dk> wrote:
>
> The best obviously is to upgrade log4j.
>
> Nobody needs that feature causing the vulnerability (obviously
> except whoever introduced it).
>

I wonder how that feature got past a design review ?

I wonder if there were too many layers involved for someone to be
able to connect the dots ?

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spau1m$8ji$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19336&group=comp.os.vms#19336

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Tue, 14 Dec 2021 20:15:50 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 23
Message-ID: <spau1m$8ji$2@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me> <spahb8$k63$1@dont-email.me> <61b8f1b3$0$695$14726298@news.sunsite.dk>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 14 Dec 2021 20:15:50 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="051ce90244940ae52d472c01051d6c77";
logging-data="8818"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+7/mDXqUD3PsF5AQI2z1hWXX8qFlVJiq4="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:0cNo2X3/kVcRI+iacfpMqGnAD74=
 by: Simon Clubley - Tue, 14 Dec 2021 20:15 UTC

On 2021-12-14, Arne Vajhøj <arne@vajhoej.dk> wrote:
> On 12/14/2021 11:39 AM, Stephen Hoffman wrote:
>> HPE has indicated that 3PAR and some other products are vulnerable to
>> this mess,
>
> Which is a pretty good indication of how big the problem is.
>
> 3PAR is not exactly what one assocoate with a Java server.
>
> Some security guy was out in the medias today and say that they expect
> it to take 2 years before everyone has patched.
>

Based on previous major events, that would not surprise me.

Perhaps now we might actually move away from needing to use 5 zillion
layers to be able to write a modern version of a Hello World application...

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<j1sordFeepmU2@mid.individual.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19358&group=comp.os.vms#19358

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.szaf.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: bill.gun...@gmail.com (Bill Gunshannon)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Tue, 14 Dec 2021 18:49:00 -0500
Lines: 21
Message-ID: <j1sordFeepmU2@mid.individual.net>
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me>
<spahb8$k63$1@dont-email.me> <61b8cb92$0$701$14726298@news.sunsite.dk>
<spal46$hji$1@dont-email.me> <61b8dcd4$0$705$14726298@news.sunsite.dk>
<spatrp$8ji$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Trace: individual.net bjTL8xk3F9AaZJ1T98t7MApV0ItHkGrLsBS7rvYY3R5iLsQe6f
Cancel-Lock: sha1:Jo1tS2KbmCSGEbtDqz2gbZJBnZ4=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.14.0
In-Reply-To: <spatrp$8ji$1@dont-email.me>
Content-Language: en-US
 by: Bill Gunshannon - Tue, 14 Dec 2021 23:49 UTC

On 12/14/21 3:12 PM, Simon Clubley wrote:
> On 2021-12-14, Arne Vajhøj <arne@vajhoej.dk> wrote:
>>
>> The best obviously is to upgrade log4j.
>>
>> Nobody needs that feature causing the vulnerability (obviously
>> except whoever introduced it).
>>
>
> I wonder how that feature got past a design review ?
>

People do design reviews?

> I wonder if there were too many layers involved for someone to be
> able to connect the dots ?

bill

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228, CVE-2021-45046

<spbf61$mi3$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19363&group=comp.os.vms#19363

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228, CVE-2021-45046
Date: Tue, 14 Dec 2021 20:08:17 -0500
Organization: HoffmanLabs LLC
Lines: 40
Message-ID: <spbf61$mi3$1@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me> <spahb8$k63$1@dont-email.me> <61b8f1b3$0$695$14726298@news.sunsite.dk> <9efe3b1d-0dab-494e-9acb-fdef8352afb1n@googlegroups.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="e16fcbb1f08ecd2d4428834c26b10798";
logging-data="23107"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX184QpH5brfPUdjMlD0HquMVa03DurR8uns="
User-Agent: Unison/2.2
Cancel-Lock: sha1:OQcRWUMMP+vMd12OspWW5q7MNnU=
 by: Stephen Hoffman - Wed, 15 Dec 2021 01:08 UTC

On 2021-12-14 19:56:24 +0000, Jim said:

> On 12/14/2021 11:39 AM, Stephen Hoffman wrote:
>> HPE has indicated that 3PAR and some other products are vulnerable to
>
> Seems HPE now reporting that the 3PAR StorServ is not vulnerable.
>
> https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00120086en_us

You're looking at the "not vulnerable" list from HPE.

You'll also want to review the "vulnerable" list from HPE, for some
problematic 3PAR and XP apps.

https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04215en_us

As for why log4j has this particular feature, there was a recent report
that the maintainers tried to remove these misfeatures, and ran afoul
of compatibility requirements.

The same-origin logic in this same neighborhood of code makes for an
interesting read, too—it's somewhere between un-robust and un-reliable.

There's what seems a robust workaround for the jndi flaw included with
the second of the two CVEs for the log4j code; with CVE-2021-45046.
This if you can't upgrade to the latest log4j.

zip -q -d log4j-core-*.jar
org/apache/logging/log4j/core/lookup/JndiLookup.class

--
Pure Personal Opinion | HoffmanLabs LLC

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61b94342$0$697$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19366&group=comp.os.vms#19366

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Tue, 14 Dec 2021 20:22:05 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me>
<spahb8$k63$1@dont-email.me> <61b8cb92$0$701$14726298@news.sunsite.dk>
<spal46$hji$1@dont-email.me> <61b8dcd4$0$705$14726298@news.sunsite.dk>
<spatrp$8ji$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <spatrp$8ji$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 23
Message-ID: <61b94342$0$697$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: ea196285.news.sunsite.dk
X-Trace: 1639531330 news.sunsite.dk 697 arne@vajhoej.dk/68.9.63.232:61652
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Wed, 15 Dec 2021 01:22 UTC

On 12/14/2021 3:12 PM, Simon Clubley wrote:
> On 2021-12-14, Arne Vajhøj <arne@vajhoej.dk> wrote:
>> The best obviously is to upgrade log4j.
>>
>> Nobody needs that feature causing the vulnerability (obviously
>> except whoever introduced it).
>
> I wonder how that feature got past a design review ?

Good question. It should not have.

> I wonder if there were too many layers involved for someone to be
> able to connect the dots ?

There are some code in loggers, but the architecture is pretty simple:

|--multiple formatters
core--|
|--multiple appenders

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19368&group=comp.os.vms#19368

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!buffer2.nntp.dca1.giganews.com!buffer1.nntp.dca1.giganews.com!nntp.supernews.com!news.supernews.com.POSTED!not-for-mail
NNTP-Posting-Date: Tue, 14 Dec 2021 21:06:42 -0600
Date: Tue, 14 Dec 2021 22:06:43 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Reply-To: dturner@islandco.com
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <j1rn0kF83l3U1@mid.individual.net>
<spakek$d18$1@dont-email.me> <j1s3acFaf5iU2@mid.individual.net>
From: dtur...@islandco.com (David Turner)
Organization: Island Computers
In-Reply-To: <j1s3acFaf5iU2@mid.individual.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Message-ID: <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
Lines: 44
X-Trace: sv3-d3zh9T0ME2FS35kJ0PpUpFvQHNojF0+1BBWIDfGkvRo543tL5QcHegbjFUkNrXRdaE5tWJ4WwGzq5Ow!zOOe+r1KAT9Kqd/qKUN5odAJr6yq9e+CYVDhoswdQXRHWvnq0oCdFSJhlll4fm/7Zjj9v1tfRFjM!Dbsrsl2mKnwN2A==
X-Complaints-To: www.supernews.com/docs/abuse.html
X-DMCA-Complaints-To: www.supernews.com/docs/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 3242
 by: David Turner - Wed, 15 Dec 2021 03:06 UTC

So the vulnerability is there. How would one take advantage of it anyway?
Wouldn't you need a privileged account to even get into the server to
start taking advantage of the flaws?
Assuming one is pretty careful about access to the network, and the
directory permissions are controlled, wouldn't it be hard to get to do
any damage?

Curious as I cannot find much information outside of the warning. I
guess no one wants to give hackers the keys to the rolls....

DT

>>>> The version of Java does not impact a bug in log4j more than
>>>> the version of C compiler impact a buffer overrun in a C library.
>>>
>>> We keep hearing this mantra over and over.  If it really is
>>> such a problem why has no one ever bothered to write a new
>>> library keeping the original APIs while internally removing
>>> the overrun problem?  Oh wait, someone did. Back in the early
>>> 80's.  On the PDP-11.  For all the DEC OSes and Ultrix-11
>>> and Version 7 Unix.  And there was even a version for the VAX.
>>> How did that work out?
>>>
>>> bill
>>
>> Way too many people don't really care about security ... until it
>> bites them on the ass.  Then they expect a law to be passed that will
>> protect them.  As if the hackers really care about laws.
>>
>> One moment I'll never forget.  I was telling a customer that it would
>> be a very bad idea for them to store their customer's data, bank
>> account, credit card info, and such in plain text on a IIS server. 
>> The response was "why not, everyone else does". And they ignored my
>> warning and did just that.  Don't know the result, the business
>> relationship didn't last much longer.
>>
>
> And then you have the cloud.  Take all your data and place it in the
> hands of someone you have no reason to trust.
>
> bill
>
So

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228, CVE-2021-45046

<spbpqk$8ua$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19369&group=comp.os.vms#19369

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228, CVE-2021-45046
Date: Tue, 14 Dec 2021 23:09:56 -0500
Organization: HoffmanLabs LLC
Lines: 47
Message-ID: <spbpqk$8ua$1@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me> <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="e16fcbb1f08ecd2d4428834c26b10798";
logging-data="9162"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19J6+O4GRfEIDLjAfhOgTBP6kuNcPsnyko="
User-Agent: Unison/2.2
Cancel-Lock: sha1:Pz2WT0CD/YRNI8cGRRj43VhOlKA=
 by: Stephen Hoffman - Wed, 15 Dec 2021 04:09 UTC

On 2021-12-15 03:06:43 +0000, David Turner said:

> So the vulnerability is there. How would one take advantage of it anyway?
> Wouldn't you need a privileged account to even get into the server to
> start taking advantage of the flaws?
> Assuming one is pretty careful about access to the network, and the
> directory permissions are controlled, wouldn't it be hard to get to do
> any damage?
>
> Curious as I cannot find much information outside of the warning. I
> guess no one wants to give hackers the keys to the rolls....

It's a full remote command execution flaw (RCE), meaning that pretty
much anything that the Java app has access to is also exposed to the
attacker, if the attacker can get the exploit text string to the
logging software.

Access to the vulnerable logger can be via host name string, by HTTP
headers, or by embedding the text into other data streams, depending on
the app involved. It varies. Widely.

What can you do with the vulnerability? There are reportedly already
cryptocurrency miners and ransomware efforts underway using the
vulnerability, and I expect we'll see a long tail of more...

An intro to the log4j vulnerability from the Swiss government:
https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/

List of affected products (re-post) :
https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592

One of the security vendors with some info:
https://www.lunasec.io/docs/blog/log4j-zero-day-mitigation-guide/

There's a Python detection tool at that last URL, though I've not
checked to see if that might be reasonably portable to OpenVMS.

Been working with some OpenVMS folks on this, and y'all with Java
installed and Java apps in use will want to take a look at what's in
those jars. Or if you have Java installed and don't need it, best
remove it.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61ba084e$0$694$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19386&group=comp.os.vms#19386

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!paganini.bofh.team!news.dns-netz.com!news.freedyn.net!newsfeed.xs4all.nl!newsfeed9.news.xs4all.nl!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Wed, 15 Dec 2021 10:22:48 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <j1rn0kF83l3U1@mid.individual.net>
<spakek$d18$1@dont-email.me> <j1s3acFaf5iU2@mid.individual.net>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 68
Message-ID: <61ba084e$0$694$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: f7393983.news.sunsite.dk
X-Trace: 1639581775 news.sunsite.dk 694 arne@vajhoej.dk/68.9.63.232:53877
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Wed, 15 Dec 2021 15:22 UTC

On 12/14/2021 10:06 PM, David Turner wrote:
> So the vulnerability is there. How would one take advantage of it anyway?
> Wouldn't you need a privileged account to even get into the server to
> start taking advantage of the flaws?
> Assuming one is pretty careful about access to the network, and the
> directory permissions are controlled, wouldn't it be hard to get to do
> any damage?
>
> Curious as I cannot find much information outside of the warning. I
> guess no one wants to give hackers the keys to the rolls....

The vulnerability is in the processing of log messages in
a logging framework.

To exploit the attackers need to get a specific message
logged.

And that is usually pretty easy. The primary purpose of logging
is to help troubleshooting problems and to do that it makes sense
to log user input.

It does not matter how the user input comes into the system.

The two most common ways are probably:
* web service calls coming in from the internet
* web form post coming in from internet

But it could also be an insider instead of internet.

And it could be plain socket or a message queue or a file
instead of HTTP(S).

Because the problem is in the data content, then traditional
isolation often doesn't help.

--firewall--Java web service with log4j

--firewall--Apache httpd proxy--firewall--Java web service with log4j

--firewall--Apache httdd proxy--firewall--PHP web service--message
queue--Java backend with log4j

--firewall--Apache httdd proxy--firewall--PHP web
service--database--Python job--message queue--Java backend with log4j

does not make a difference if that Java code calls log4j with
user input with malicious content then bad things can happen.

To move on with the exploit the Java code need to be able to
reach a server controlled by the attacker, but many places
only have strict control of inbound traffic not outbound traffic.

And the Java code need to have access to something. But if the
code is intended to do something on behalf of the user then it
obviously need to have access to user data. That it may not have
access to modify OS does not stop bad things from happening.

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19392&group=comp.os.vms#19392

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!buffer2.nntp.dca1.giganews.com!nntp.supernews.com!news.supernews.com.POSTED!not-for-mail
NNTP-Posting-Date: Wed, 15 Dec 2021 11:51:26 -0600
Date: Wed, 15 Dec 2021 12:51:26 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Reply-To: dturner@islandco.com
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <j1rn0kF83l3U1@mid.individual.net>
<spakek$d18$1@dont-email.me> <j1s3acFaf5iU2@mid.individual.net>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
From: dtur...@islandco.com (David Turner)
Organization: Island Computers
In-Reply-To: <61ba084e$0$694$14726298@news.sunsite.dk>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Message-ID: <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com>
Lines: 89
X-Trace: sv3-JhA9NODGmwdqkf/di8qQV5HTOLRuIPdDsaBprK4Q3cKgPwp3Gyku5u49VgaMJuAndDMZ/gbH8qPZBRk!yCkQPJKIQDocQtA0f28p6AVy0FLBm9Nyh3V2GdmyRuK0etNXVj7V9Lc8XB6Y+M0/kQ0+b1w+b7Aw!mUdh85Aw3wT2Kw==
X-Complaints-To: www.supernews.com/docs/abuse.html
X-DMCA-Complaints-To: www.supernews.com/docs/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 4227
 by: David Turner - Wed, 15 Dec 2021 17:51 UTC

I wonder if there is anything that can be done in the .htaccess file

I have most countries outside of our business realm blocked so they
cannot even connect to the website
Since these attempts are typically made by a few malicious players in a
few countries, blocking access via country and ip has really helped us

On 12/15/2021 10:22 AM, Arne Vajhøj wrote:
> On 12/14/2021 10:06 PM, David Turner wrote:
>> So the vulnerability is there. How would one take advantage of it
>> anyway?
>> Wouldn't you need a privileged account to even get into the server to
>> start taking advantage of the flaws?
>> Assuming one is pretty careful about access to the network, and the
>> directory permissions are controlled, wouldn't it be hard to get to
>> do any damage?
>>
>> Curious as I cannot find much information outside of the warning. I
>> guess no one wants to give hackers the keys to the rolls....
>
> The vulnerability is in the processing of log messages in
> a logging framework.
>
> To exploit the attackers need to get a specific message
> logged.
>
> And that is usually pretty easy. The primary purpose of logging
> is to help troubleshooting problems and to do that it makes sense
> to log user input.
>
> It does not matter how the user input comes into the system.
>
> The two most common ways are probably:
> * web service calls coming in from the internet
> * web form post coming in from internet
>
> But it could also be an insider instead of internet.
>
> And it could be plain socket or a message queue or a file
> instead of HTTP(S).
>
> Because the problem is in the data content, then traditional
> isolation often doesn't help.
>

> --firewall--Java web service with log4j
>
> --firewall--Apache httpd proxy--firewall--Java web service with log4j
>
> --firewall--Apache httdd proxy--firewall--PHP web service--message
> queue--Java backend with log4j
>
> --firewall--Apache httdd proxy--firewall--PHP web
> service--database--Python job--message queue--Java backend with log4j
>
> does not make a difference if that Java code calls log4j with
> user input with malicious content then bad things can happen.
>
> To move on with the exploit the Java code need to be able to
> reach a server controlled by the attacker, but many places
> only have strict control of inbound traffic not outbound traffic.
>
> And the Java code need to have access to something. But if the
> code is intended to do something on behalf of the user then it
> obviously need to have access to user data. That it may not have
> access to modify OS does not stop bad things from happening.
>
> Arne
>
>
>
>
>
>
>
>
>
>

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61ba319c$0$701$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19395&group=comp.os.vms#19395

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Wed, 15 Dec 2021 13:19:02 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <j1rn0kF83l3U1@mid.individual.net>
<spakek$d18$1@dont-email.me> <j1s3acFaf5iU2@mid.individual.net>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 20
Message-ID: <61ba319c$0$701$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: d07b3953.news.sunsite.dk
X-Trace: 1639592349 news.sunsite.dk 701 arne@vajhoej.dk/68.9.63.232:60606
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Wed, 15 Dec 2021 18:19 UTC

On 12/15/2021 12:51 PM, David Turner wrote:
> I wonder if there is anything that can be done in the .htaccess file

I don't think so.

It must be possible to come up with blocking rules for mod_security though.

> I have most countries outside of our business realm blocked so they
> cannot even connect to the website
> Since these attempts are typically made by a few malicious players in a
> few countries, blocking access via country and ip has really helped us

That can help against amateur hackers.

It does not help against the more professional hackers.

This vulnerability is supposedly already being exploited by what
is known as "state actors".

Arne

Pages:123
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor