Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Staff meeting in the conference room in %d minutes.


computers / comp.os.vms / Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

SubjectAuthor
* Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Stephen Hoffman
+* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|+- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|+- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Dennis Boone
|+* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Craig A. Berry
||+- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
||`* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Stephen Hoffman
|| +* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|| |`* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Craig A. Berry
|| | `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|| |  `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Simon Clubley
|| |   +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Bill Gunshannon
|| |   `- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|| `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
||  +* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Jim
||  |`* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228, CVE-2021-45046Stephen Hoffman
||  | `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228,Arne Vajhøj
||  |  `- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228,Arne Vajhøj
||  `- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Simon Clubley
|`* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Bill Gunshannon
| `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Dave Froble
|  `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Bill Gunshannon
|   `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228David Turner
|    +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228, CVE-2021-45046Stephen Hoffman
|    `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|     `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228David Turner
|      +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|      `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Stephen Hoffman
|       `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228David Turner
|        +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|        +* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Dennis Boone
|        |`- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Simon Clubley
|        +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Stephen Hoffman
|        +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Phillip Helbig (undress to reply
|        `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Bill Gunshannon
|         `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228David Turner
|          +* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Craig A. Berry
|          |+* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|          ||`* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|          || `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Simon Clubley
|          ||  `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|          ||   `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Simon Clubley
|          ||    `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|          ||     `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Simon Clubley
|          ||      `- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|          |`- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Stephen Hoffman
|          `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228George Cornelius
|           `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|            `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228John Reagan
|             +- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|             +* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Grant Taylor
|             |+- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
|             |`- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228John Reagan
|             `* Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Phillip Helbig (undress to reply
|              `- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Arne Vajhøj
`- Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228Steven Schweda

Pages:123
Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spdcdm$cap$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19398&group=comp.os.vms#19398

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Wed, 15 Dec 2021 13:33:26 -0500
Organization: HoffmanLabs LLC
Lines: 18
Message-ID: <spdcdm$cap$1@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me> <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com> <61ba084e$0$694$14726298@news.sunsite.dk> <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="e16fcbb1f08ecd2d4428834c26b10798";
logging-data="12633"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/iNaQnLpprx8/fr9+EThLdcNu7UdLZAvE="
User-Agent: Unison/2.2
Cancel-Lock: sha1:09MwCBwC/cRtFiurZ+VVxMBAkzk=
 by: Stephen Hoffman - Wed, 15 Dec 2021 18:33 UTC

On 2021-12-15 17:51:26 +0000, David Turner said:

> I wonder if there is anything that can be done in the .htaccess file

Any data stream within any Java app that happens to incorporate the
vulnerable logger is a potential vulnerability.

Successfully blocking all of that that access via .htaccess from all
potential sources is roughly equivalent to shutting down the app.

Web application firewalls are failing at similar filtering tasks, given
the variability and ease of masking the JNDI exploit text strings.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19406&group=comp.os.vms#19406

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!buffer2.nntp.dca1.giganews.com!buffer1.nntp.dca1.giganews.com!nntp.supernews.com!news.supernews.com.POSTED!not-for-mail
NNTP-Posting-Date: Wed, 15 Dec 2021 12:55:59 -0600
Date: Wed, 15 Dec 2021 13:55:59 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Reply-To: dturner@islandco.com
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me>
From: dtur...@islandco.com (David Turner)
Organization: Island Computers
In-Reply-To: <spdcdm$cap$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Message-ID: <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
Lines: 23
X-Trace: sv3-hkucSIRUjeHTen2CtC1+t1UvOvgjwdSKum6fT/VK53NmgqcTBh0TDq8S6QKm+eMrH66SWV1B7r9PZ/p!9P8/+QI2Uak2t5lm/sE+YkrUrCarJB/kHIhjAhNHtRBEkR4Z8CQz2QExiHLOuJZTCMh//KEcwIX6!uZO/gnRaswPAjg==
X-Complaints-To: www.supernews.com/docs/abuse.html
X-DMCA-Complaints-To: www.supernews.com/docs/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 2228
 by: David Turner - Wed, 15 Dec 2021 18:55 UTC

SO if it tends to be "state actors" blocking those "states" or countries
may be the best option to start off.

On 12/15/2021 1:33 PM, Stephen Hoffman wrote:
> On 2021-12-15 17:51:26 +0000, David Turner said:
>
>> I wonder if there is anything that can be done in the .htaccess file
>
> Any data stream within any Java app that happens to incorporate the
> vulnerable logger is a potential vulnerability.
>
> Successfully blocking all of that that access via .htaccess from all
> potential sources is roughly equivalent to shutting down the app.
>
> Web application firewalls are failing at similar filtering tasks,
> given the variability and ease of masking the JNDI exploit text strings.
>
>
>

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61ba3bd4$0$704$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19408&group=comp.os.vms#19408

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.swapon.de!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Wed, 15 Dec 2021 14:02:44 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me>
<r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 14
Message-ID: <61ba3bd4$0$704$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 886e7b74.news.sunsite.dk
X-Trace: 1639594965 news.sunsite.dk 704 arne@vajhoej.dk/68.9.63.232:62036
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Wed, 15 Dec 2021 19:02 UTC

On 12/15/2021 1:55 PM, David Turner wrote:
> SO if it tends to be "state actors" blocking those "states" or countries
> may be the best option to start off.

No.

State actors are very professional.

You can be sure that they have network services available so they can
pretend to be from any country they want to.

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<q7ydneFR69neoCf8nZ2dnUU7-aGdnZ2d@giganews.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19409&group=comp.os.vms#19409

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!buffer2.nntp.dca1.giganews.com!buffer1.nntp.dca1.giganews.com!news.giganews.com.POSTED!not-for-mail
NNTP-Posting-Date: Wed, 15 Dec 2021 13:08:51 -0600
Sender: Dennis Boone <drb@yagi.h-net.org>
From: drb...@ihatespam.msu.edu (Dennis Boone)
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me> <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com> <61ba084e$0$694$14726298@news.sunsite.dk> <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me> <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
User-Agent: tin/2.4.5-20201224 ("Glen Albyn") (FreeBSD/12.2-RELEASE-p7 (amd64))
Message-ID: <q7ydneFR69neoCf8nZ2dnUU7-aGdnZ2d@giganews.com>
Date: Wed, 15 Dec 2021 13:08:51 -0600
Lines: 13
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-0D1uYa0mkr2HzR0l3Tq3A8F683E/UBHZFiJ8fnPkcgg+vkgb4urqfswClQGcP9ZKy9b2CRDL63oQ/2u!uz/2vOSH7yXRenJZxV6tvViRZSt7ZAc8PLz99q8hP5vEkYvT5eser81W5t6Fnjr2VUfdpqg=
X-Complaints-To: abuse@giganews.com
X-DMCA-Notifications: http://www.giganews.com/info/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 1898
 by: Dennis Boone - Wed, 15 Dec 2021 19:08 UTC

> SO if it tends to be "state actors" blocking those "states" or countries
> may be the best option to start off.

Blocking countries... by IP address? I don't know how else you'd try
to do that. But it's porous as hell. US-EAST-1 is in Virginia, and
Amazon certainly doesn't prevent foreigners from setting up VMs there.
Many VPN options. Etc. Any state actor that can't trivially work
around an IP range block isn't really a state actor.

The best option is to get the vulnerable log4j versions off your
servers. Period. Only hippopotamus will do.

De

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spdek1$se0$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19410&group=comp.os.vms#19410

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Wed, 15 Dec 2021 14:10:57 -0500
Organization: HoffmanLabs LLC
Lines: 14
Message-ID: <spdek1$se0$1@dont-email.me>
References: <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com> <61ba084e$0$694$14726298@news.sunsite.dk> <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me> <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="e16fcbb1f08ecd2d4428834c26b10798";
logging-data="29120"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19I9NGKUZoG67NEZADBe1SOFwbnLP2FJdg="
User-Agent: Unison/2.2
Cancel-Lock: sha1:euhi4tYz1HW4topj+rguhjAG3dU=
 by: Stephen Hoffman - Wed, 15 Dec 2021 19:10 UTC

On 2021-12-15 18:55:59 +0000, David Turner said:

> SO if it tends to be "state actors" blocking those "states" or
> countries may be the best option to start off.

With pools of servers available for rental in many states, and with
misconfigured and breached computers ~everywhere, that would not be an
entirely reliable strategy.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spdfbm$uss$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19413&group=comp.os.vms#19413

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Wed, 15 Dec 2021 19:23:35 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 12
Message-ID: <spdfbm$uss$1@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me> <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com> <61ba084e$0$694$14726298@news.sunsite.dk> <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me> <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com> <q7ydneFR69neoCf8nZ2dnUU7-aGdnZ2d@giganews.com>
Injection-Date: Wed, 15 Dec 2021 19:23:35 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="314b1db60d8323b95095b712e7e8202b";
logging-data="31644"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+201JIJoBTNCyfrK7+bqr4IPhCQvUasl4="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:2Fqwo2eybxtiCrQ7bpyN/AKTIrI=
 by: Simon Clubley - Wed, 15 Dec 2021 19:23 UTC

On 2021-12-15, Dennis Boone <drb@ihatespam.msu.edu> wrote:
> Any state actor that can't trivially work
> around an IP range block isn't really a state actor.
>

Well, they could always be working for Grand Fenwick... :-)

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spdn6l$1io8$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19416&group=comp.os.vms#19416

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!/2amXF1E4u0SqMi0yru5/Q.user.46.165.242.75.POSTED!not-for-mail
From: hel...@asclothestro.multivax.de (Phillip Helbig (undress to reply)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Wed, 15 Dec 2021 21:37:25 -0000 (UTC)
Organization: Multivax C&R
Message-ID: <spdn6l$1io8$1@gioia.aioe.org>
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me> <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com> <61ba084e$0$694$14726298@news.sunsite.dk> <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me> <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-15
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="51976"; posting-host="/2amXF1E4u0SqMi0yru5/Q.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
X-Notice: Filtered by postfilter v. 0.9.2
 by: Phillip Helbig (undr - Wed, 15 Dec 2021 21:37 UTC

In article <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>, David
Turner <dturner@islandco.com> writes:

> SO if it tends to be "state actors" blocking those "states" or countries
> may be the best option to start off.

Why would they operate from within their own countries?

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<j1vcegFtpe0U1@mid.individual.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19421&group=comp.os.vms#19421

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: bill.gun...@gmail.com (Bill Gunshannon)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Wed, 15 Dec 2021 18:35:44 -0500
Lines: 10
Message-ID: <j1vcegFtpe0U1@mid.individual.net>
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me>
<r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net n+eN48hk7LhWj3rv9NNWUQa8p4YFT0QPknLw+V3gsaa0eXcDN1
Cancel-Lock: sha1:C9nVe5k57Vy/SgYuEZFlmcT8tB4=
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.14.0
In-Reply-To: <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
Content-Language: en-US
 by: Bill Gunshannon - Wed, 15 Dec 2021 23:35 UTC

On 12/15/21 1:55 PM, David Turner wrote:
> SO if it tends to be "state actors" blocking those "states" or countries
> may be the best option to start off.
>

Not necessarily. You are assuming that the attacks will come
from addresses in their address blocks and that may not be the
case.

bill

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19424&group=comp.os.vms#19424

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!buffer2.nntp.dca1.giganews.com!nntp.supernews.com!news.supernews.com.POSTED!not-for-mail
NNTP-Posting-Date: Wed, 15 Dec 2021 20:20:16 -0600
Date: Wed, 15 Dec 2021 21:20:16 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Reply-To: dturner@islandco.com
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me>
<r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
<j1vcegFtpe0U1@mid.individual.net>
From: dtur...@islandco.com (David Turner)
Organization: Island Computers
In-Reply-To: <j1vcegFtpe0U1@mid.individual.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Message-ID: <EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com>
Lines: 20
X-Trace: sv3-quwHMXgHFY8AaQ86NUDfhwk9ATiukFHZynU+G2tPMa8kFuUbBbdOXQ2/hp8NOmHZFoqRcQEJToaEdK2!eLF+/i3YmWsM/pFNmKMW0Jkv66vLezqxV0NnSvViUK5Sx7rQ7ZKWcDYO545MPMiyREozyLsafYMQ!Ptx5gPMxfMfTIg==
X-Complaints-To: www.supernews.com/docs/abuse.html
X-DMCA-Complaints-To: www.supernews.com/docs/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 2165
 by: David Turner - Thu, 16 Dec 2021 02:20 UTC

It's better than nothing
I think a lot of US hosting companies also have blocked suspicious
Russian traffic and will not allow non-US companies to be hosted.

It has certainly helped us.

On 12/15/2021 6:35 PM, Bill Gunshannon wrote:
> On 12/15/21 1:55 PM, David Turner wrote:
>> SO if it tends to be "state actors" blocking those "states" or
>> countries may be the best option to start off.
>>
>
> Not necessarily.  You are assuming that the attacks will come
> from addresses in their address blocks and that may not be the
> case.
>
> bill

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spgfm2$ub$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19434&group=comp.os.vms#19434

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: craigbe...@nospam.mac.com (Craig A. Berry)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Thu, 16 Dec 2021 16:47:28 -0600
Organization: A noiseless patient Spider
Lines: 7
Message-ID: <spgfm2$ub$1@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me>
<r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
<j1vcegFtpe0U1@mid.individual.net>
<EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 16 Dec 2021 22:47:30 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="d0f3223d7227cde8909c20ffc78af538";
logging-data="971"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+muGEtGwtBM9apihQQTictPAdmbioXPAM="
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.4.0
Cancel-Lock: sha1:CLgQ2KleVNhNC79w9AGnx3MExJE=
In-Reply-To: <EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com>
Content-Language: en-US
 by: Craig A. Berry - Thu, 16 Dec 2021 22:47 UTC

Note that log4j 2.16.0 has now been released to fix vulnerabilities
still present in the 2.15.0 released a few days ago, and many of the
mitigations published in the last week are now considered inadequate:

<https://logging.apache.org/log4j/2.x/security.html>

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61bbd7bf$0$705$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19435&group=comp.os.vms#19435

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Thu, 16 Dec 2021 19:20:13 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me>
<r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
<j1vcegFtpe0U1@mid.individual.net>
<EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com> <spgfm2$ub$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <spgfm2$ub$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 43
Message-ID: <61bbd7bf$0$705$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: d1266e83.news.sunsite.dk
X-Trace: 1639700415 news.sunsite.dk 705 arne@vajhoej.dk/68.9.63.232:61244
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Fri, 17 Dec 2021 00:20 UTC

On 12/16/2021 5:47 PM, Craig A. Berry wrote:
> Note that log4j 2.16.0 has now been released to fix vulnerabilities
> still present in the 2.15.0 released a few days ago, and many of the
> mitigations published in the last week are now considered inadequate:
>
> <https://logging.apache.org/log4j/2.x/security.html>

Yes.

But the new one is not in the same category as the first.

<quote>
CVE-2021-45046

CVE-2021-45046: Apache Log4j2 Thread Context Message Pattern and Context
Lookup Pattern vulnerable to a denial of service attack.

Severity: Moderate

Base CVSS Score: 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

Versions Affected: all versions from 2.0-beta9 through 2.12.1 and 2.13.0
through 2.15.0
</quote>

vs

<quote>
CVE-2021-44228

CVE-2021-44228: Apache Log4j2 JNDI features do not protect against
attacker controlled LDAP and other JNDI related endpoints.

Severity: Critical

Base CVSS Score: 10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Versions Affected: all versions from 2.0-beta9 through 2.12.1 and 2.13.0
through 2.14.1
</quote>

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<b7663fee-2dcb-49fa-b7de-50a037e3166bn@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19436&group=comp.os.vms#19436

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a37:8d86:: with SMTP id p128mr544963qkd.706.1639706657734;
Thu, 16 Dec 2021 18:04:17 -0800 (PST)
X-Received: by 2002:a05:6214:23cc:: with SMTP id hr12mr565828qvb.66.1639706657569;
Thu, 16 Dec 2021 18:04:17 -0800 (PST)
Path: i2pn2.org!i2pn.org!paganini.bofh.team!news.dns-netz.com!news.freedyn.net!newsreader4.netcologne.de!news.netcologne.de!feeder1.cambriumusenet.nl!feed.tweak.nl!209.85.160.216.MISMATCH!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Thu, 16 Dec 2021 18:04:17 -0800 (PST)
In-Reply-To: <sp8cvo$6dt$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=76.76.60.100; posting-account=OjKUgAkAAAAXAqdVEKd-Gc8RltEUx3Xq
NNTP-Posting-Host: 76.76.60.100
References: <sp8cvo$6dt$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <b7663fee-2dcb-49fa-b7de-50a037e3166bn@googlegroups.com>
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
From: sms.anti...@gmail.com (Steven Schweda)
Injection-Date: Fri, 17 Dec 2021 02:04:17 +0000
Content-Type: text/plain; charset="UTF-8"
 by: Steven Schweda - Fri, 17 Dec 2021 02:04 UTC

I see that my Web server log has started to collect a variety of
"${jndi:ldap:" stuff, some of which is encoded to avoid simple
recognition ("${${lower:j}${lower:n}${lower:d}i:"). Interesting that
because the vulnerability is in the logging, the payload can appear in
the referrer string, not necessarily in the request URL itself. What a
world, what a world...

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spgrso$a37$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19438&group=comp.os.vms#19438

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Thu, 16 Dec 2021 21:15:52 -0500
Organization: HoffmanLabs LLC
Lines: 13
Message-ID: <spgrso$a37$1@dont-email.me>
References: <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com> <61ba084e$0$694$14726298@news.sunsite.dk> <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me> <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com> <EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com> <spgfm2$ub$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="1e9118a9df67d2d88d89bce0c55bea56";
logging-data="10343"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19pSdz/Nhk5pxQeBgQMAixYGB4cMg1hM6Q="
User-Agent: Unison/2.2
Cancel-Lock: sha1:8Vcgf4RT2fKQFVHxHa58d1Bx8R8=
 by: Stephen Hoffman - Fri, 17 Dec 2021 02:15 UTC

On 2021-12-16 22:47:28 +0000, Craig A. Berry said:

> Note that log4j 2.16.0 has now been released to fix vulnerabilities
> still present in the 2.15.0 released a few days ago, and many of the
> mitigations published in the last week are now considered inadequate:

Y'all want log4j 2.17 now, and not 2.16.

https://issues.apache.org/jira/browse/LOG4J2-3230

--
Pure Personal Opinion | HoffmanLabs LLC

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228, CVE-2021-45046

<61bbfa04$0$699$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19440&group=comp.os.vms#19440

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Thu, 16 Dec 2021 21:46:26 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228,
CVE-2021-45046
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me>
<spahb8$k63$1@dont-email.me> <61b8f1b3$0$695$14726298@news.sunsite.dk>
<9efe3b1d-0dab-494e-9acb-fdef8352afb1n@googlegroups.com>
<spbf61$mi3$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <spbf61$mi3$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 26
Message-ID: <61bbfa04$0$699$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: eb7158ad.news.sunsite.dk
X-Trace: 1639709188 news.sunsite.dk 699 arne@vajhoej.dk/68.9.63.232:49892
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Fri, 17 Dec 2021 02:46 UTC

On 12/14/2021 8:08 PM, Stephen Hoffman wrote:
> On 2021-12-14 19:56:24 +0000, Jim said:
>> On 12/14/2021 11:39 AM, Stephen Hoffman wrote:
>>> HPE has indicated that 3PAR and some other products are vulnerable to
>>
>> Seems HPE now reporting that the 3PAR StorServ is not vulnerable.
>>
>> https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00120086en_us
>
> You're looking at the "not vulnerable" list from HPE.
>
> You'll also want to review the "vulnerable" list from HPE, for some
> problematic 3PAR and XP apps.
>
> https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04215en_us

I saw a list for multiple vendors:

https://www.continuitysoftware.com/blog/centralized-list-of-storage-and-backup-systems-affected-by-zero-day-log4shell-vulnerability-cve-2021-44228

It is a pretty long list!

:-(

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228, CVE-2021-45046

<61bcd822$0$705$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19448&group=comp.os.vms#19448

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Fri, 17 Dec 2021 13:34:08 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228,
CVE-2021-45046
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spa6fl$1ph$1@dont-email.me>
<spahb8$k63$1@dont-email.me> <61b8f1b3$0$695$14726298@news.sunsite.dk>
<9efe3b1d-0dab-494e-9acb-fdef8352afb1n@googlegroups.com>
<spbf61$mi3$1@dont-email.me> <61bbfa04$0$699$14726298@news.sunsite.dk>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <61bbfa04$0$699$14726298@news.sunsite.dk>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 33
Message-ID: <61bcd822$0$705$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: d8b4fdfd.news.sunsite.dk
X-Trace: 1639766051 news.sunsite.dk 705 arne@vajhoej.dk/68.9.63.232:61108
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Fri, 17 Dec 2021 18:34 UTC

On 12/16/2021 9:46 PM, Arne Vajhøj wrote:
> On 12/14/2021 8:08 PM, Stephen Hoffman wrote:
>> On 2021-12-14 19:56:24 +0000, Jim said:
>>> On 12/14/2021 11:39 AM, Stephen Hoffman wrote:
>>>> HPE has indicated that 3PAR and some other products are vulnerable to
>>>
>>> Seems HPE now reporting that the 3PAR StorServ is not vulnerable.
>>>
>>> https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00120086en_us
>>
>>
>> You're looking at the "not vulnerable" list from HPE.
>>
>> You'll also want to review the "vulnerable" list from HPE, for some
>> problematic 3PAR and XP apps.
>>
>> https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04215en_us
>
>
> I saw a list for multiple vendors:
>
> https://www.continuitysoftware.com/blog/centralized-list-of-storage-and-backup-systems-affected-by-zero-day-log4shell-vulnerability-cve-2021-44228
>
>
> It is a pretty long list!
>
> :-(

https://www.bleepingcomputer.com/news/security/conti-ransomware-uses-log4j-bug-to-hack-vmware-vcenter-servers

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61bd08dd$0$706$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19451&group=comp.os.vms#19451

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!news.swapon.de!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Fri, 17 Dec 2021 17:02:03 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me>
<r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
<j1vcegFtpe0U1@mid.individual.net>
<EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com> <spgfm2$ub$1@dont-email.me>
<61bbd7bf$0$705$14726298@news.sunsite.dk>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <61bbd7bf$0$705$14726298@news.sunsite.dk>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 75
Message-ID: <61bd08dd$0$706$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: e83dc226.news.sunsite.dk
X-Trace: 1639778526 news.sunsite.dk 706 arne@vajhoej.dk/68.9.63.232:52262
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Fri, 17 Dec 2021 22:02 UTC

On 12/16/2021 7:20 PM, Arne Vajhøj wrote:
> On 12/16/2021 5:47 PM, Craig A. Berry wrote:
>> Note that log4j 2.16.0 has now been released to fix vulnerabilities
>> still present in the 2.15.0 released a few days ago, and many of the
>> mitigations published in the last week are now considered inadequate:
>>
>> <https://logging.apache.org/log4j/2.x/security.html>
>
> Yes.
>
> But the new one is not in the same category as the first.
>
> <quote>
> CVE-2021-45046
>
> CVE-2021-45046: Apache Log4j2 Thread Context Message Pattern and Context
> Lookup Pattern vulnerable to a denial of service attack.
>
> Severity: Moderate
>
> Base CVSS Score: 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
>
> Versions Affected: all versions from 2.0-beta9 through 2.12.1 and 2.13.0
> through 2.15.0
> </quote>

They have now updated the severity to:

CVE-2021-45046 Remote Code Execution
Severity Critical
Base CVSS Score 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Versions Affected All versions from 2.0-beta9 to 2.15.0, excluding 2.12.2

....

Severity is now Critical

The original severity of this CVE was rated as Moderate; since this CVE
was published security experts found additional exploits against the
Log4j 2.15.0 release, that could lead to information leaks, RCE (remote
code execution) and LCE (local code execution) attacks.

Base CVSS Score changed from 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
to 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).

The title of this CVE was changed from mentioning Denial of Service
attacks to mentioning Remote Code Execution attacks.

Only Pattern Layouts with a Context Lookup (for example,
$${ctx:loginId}) are vulnerable to this. This page previously
incorrectly mentioned that Thread Context Map pattern (%X, %mdc, or
%MDC) in the layout would also allow this vulnerability.

While Log4j 2.15.0 makes a best-effort attempt to restrict JNDI LDAP
lookups to localhost by default, there are ways to bypass this and users
should not rely on this.

> vs
>
> <quote>
> CVE-2021-44228
>
> CVE-2021-44228: Apache Log4j2 JNDI features do not protect against
> attacker controlled LDAP and other JNDI related endpoints.
>
> Severity: Critical
>
> Base CVSS Score: 10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
>
> Versions Affected: all versions from 2.0-beta9 through 2.12.1 and 2.13.0
> through 2.14.1
> </quote>

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spqjrp$ufr$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19483&group=comp.os.vms#19483

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Mon, 20 Dec 2021 19:00:10 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 24
Message-ID: <spqjrp$ufr$1@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me> <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com> <61ba084e$0$694$14726298@news.sunsite.dk> <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me> <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com> <j1vcegFtpe0U1@mid.individual.net> <EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com> <spgfm2$ub$1@dont-email.me> <61bbd7bf$0$705$14726298@news.sunsite.dk> <61bd08dd$0$706$14726298@news.sunsite.dk>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 20 Dec 2021 19:00:10 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="18576fb34121fa0a6878bf93c2216abe";
logging-data="31227"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+VD9p3z6410jiCcfjH9bMpGs0qIJpq+UM="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:0P6mDtjMwUhhTaYBNgjTIWPfIK8=
 by: Simon Clubley - Mon, 20 Dec 2021 19:00 UTC

On 2021-12-17, Arne Vajhøj <arne@vajhoej.dk> wrote:
>
> They have now updated the severity to:
>
> CVE-2021-45046 Remote Code Execution
> Severity Critical
> Base CVSS Score 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
> Versions Affected All versions from 2.0-beta9 to 2.15.0, excluding 2.12.2
>

Perhaps we should just wait for version 2.40.0 to be released, which
will probably be in a couple of weeks at this rate. :-)

For anyone not aware, there is now a third CVE:

https://www.theregister.com/2021/12/19/log4j_new_flaw_cve_2021_45105/

The latest Log4j version is now 2.17.0.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61c0d631$0$706$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19485&group=comp.os.vms#19485

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Mon, 20 Dec 2021 14:14:57 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.0
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me>
<r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
<j1vcegFtpe0U1@mid.individual.net>
<EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com> <spgfm2$ub$1@dont-email.me>
<61bbd7bf$0$705$14726298@news.sunsite.dk>
<61bd08dd$0$706$14726298@news.sunsite.dk> <spqjrp$ufr$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <spqjrp$ufr$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 30
Message-ID: <61c0d631$0$706$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 13c19f6e.news.sunsite.dk
X-Trace: 1640027697 news.sunsite.dk 706 arne@vajhoej.dk/68.9.63.232:49887
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Mon, 20 Dec 2021 19:14 UTC

On 12/20/2021 2:00 PM, Simon Clubley wrote:
> On 2021-12-17, Arne Vajhøj <arne@vajhoej.dk> wrote:
>> They have now updated the severity to:
>>
>> CVE-2021-45046 Remote Code Execution
>> Severity Critical
>> Base CVSS Score 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
>> Versions Affected All versions from 2.0-beta9 to 2.15.0, excluding 2.12.2
>>
>
> Perhaps we should just wait for version 2.40.0 to be released, which
> will probably be in a couple of weeks at this rate. :-)
>
> For anyone not aware, there is now a third CVE:
>
> https://www.theregister.com/2021/12/19/log4j_new_flaw_cve_2021_45105/
>
> The latest Log4j version is now 2.17.0.

(Hoff already mentioned that one)

CVE-2021-45105:
Apache Log4j2 does not always protect from infinite recursion in lookup
evaluation
CVE-2021-45105 Denial of Service
Severity High
Base CVSS Score 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Versions Affected All versions from 2.0-beta9 to 2.16.0

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<spql6j$ufr$3@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19486&group=comp.os.vms#19486

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Mon, 20 Dec 2021 19:23:00 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 12
Message-ID: <spql6j$ufr$3@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me> <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com> <61ba084e$0$694$14726298@news.sunsite.dk> <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me> <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com> <j1vcegFtpe0U1@mid.individual.net> <EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com> <spgfm2$ub$1@dont-email.me> <61bbd7bf$0$705$14726298@news.sunsite.dk> <61bd08dd$0$706$14726298@news.sunsite.dk> <spqjrp$ufr$1@dont-email.me> <61c0d631$0$706$14726298@news.sunsite.dk>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 20 Dec 2021 19:23:00 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="18576fb34121fa0a6878bf93c2216abe";
logging-data="31227"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/GzoS3KbuZdIiuDeKWXmFUM6JzVFoQ0W0="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:t8uAVPERE5zlA5WDiEBI28HTC20=
 by: Simon Clubley - Mon, 20 Dec 2021 19:23 UTC

On 2021-12-20, Arne Vajhøj <arne@vajhoej.dk> wrote:
>
> (Hoff already mentioned that one)
>

I missed that. Sorry. :-)

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61ce4b83$0$695$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19733&group=comp.os.vms#19733

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Thu, 30 Dec 2021 19:14:57 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.1
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me>
<r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
<j1vcegFtpe0U1@mid.individual.net>
<EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com> <spgfm2$ub$1@dont-email.me>
<61bbd7bf$0$705$14726298@news.sunsite.dk>
<61bd08dd$0$706$14726298@news.sunsite.dk> <spqjrp$ufr$1@dont-email.me>
<61c0d631$0$706$14726298@news.sunsite.dk> <spql6j$ufr$3@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <spql6j$ufr$3@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 10
Message-ID: <61ce4b83$0$695$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 6988f18a.news.sunsite.dk
X-Trace: 1640909699 news.sunsite.dk 695 arne@vajhoej.dk/68.9.63.232:54962
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Fri, 31 Dec 2021 00:14 UTC

On 12/20/2021 2:23 PM, Simon Clubley wrote:
> On 2021-12-20, Arne Vajhøj <arne@vajhoej.dk> wrote:
>> (Hoff already mentioned that one)
>
> I missed that. Sorry. :-)

And they found yet another vulnerability so now 2.17.1 is out.

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<sqmlpi$1fh$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19736&group=comp.os.vms#19736

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Fri, 31 Dec 2021 10:24:50 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 26
Message-ID: <sqmlpi$1fh$2@dont-email.me>
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me> <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com> <61ba084e$0$694$14726298@news.sunsite.dk> <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me> <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com> <j1vcegFtpe0U1@mid.individual.net> <EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com> <spgfm2$ub$1@dont-email.me> <61bbd7bf$0$705$14726298@news.sunsite.dk> <61bd08dd$0$706$14726298@news.sunsite.dk> <spqjrp$ufr$1@dont-email.me> <61c0d631$0$706$14726298@news.sunsite.dk> <spql6j$ufr$3@dont-email.me> <61ce4b83$0$695$14726298@news.sunsite.dk>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 31 Dec 2021 10:24:50 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="732ceb314f620c34b5a89bc99dd754a2";
logging-data="1521"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+fLDAz6AKmRegigtM01YQNJZtdg5tXuwA="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:YGy/XetCL9hAZOxlwVQ27vOw2/E=
 by: Simon Clubley - Fri, 31 Dec 2021 10:24 UTC

On 2021-12-30, Arne Vajhøj <arne@vajhoej.dk> wrote:
> On 12/20/2021 2:23 PM, Simon Clubley wrote:
>> On 2021-12-20, Arne Vajhøj <arne@vajhoej.dk> wrote:
>>> (Hoff already mentioned that one)
>>
>> I missed that. Sorry. :-)
>
> And they found yet another vulnerability so now 2.17.1 is out.
>

On the plus side, at least the discoveries are getting further apart. :-)

As a gentle reminder to everyone, this is what awaits VMS if the
researchers turn their attention to it. Log4j was in use for years
and only after researchers turned their attention to it, did these
longstanding issues get discovered.

I'm sure that when the vulnerable Log4j versions were introduced,
everyone continued to use it without thinking that they may have
just introduced a vulnerability into their application.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61cf0d9c$0$698$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19750&group=comp.os.vms#19750

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!rocksolid2!news.neodome.net!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Fri, 31 Dec 2021 09:02:58 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.1
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me>
<r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
<j1vcegFtpe0U1@mid.individual.net>
<EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com> <spgfm2$ub$1@dont-email.me>
<61bbd7bf$0$705$14726298@news.sunsite.dk>
<61bd08dd$0$706$14726298@news.sunsite.dk> <spqjrp$ufr$1@dont-email.me>
<61c0d631$0$706$14726298@news.sunsite.dk> <spql6j$ufr$3@dont-email.me>
<61ce4b83$0$695$14726298@news.sunsite.dk> <sqmlpi$1fh$2@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <sqmlpi$1fh$2@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 41
Message-ID: <61cf0d9c$0$698$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: c656d12f.news.sunsite.dk
X-Trace: 1640959388 news.sunsite.dk 698 arne@vajhoej.dk/68.9.63.232:52180
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Fri, 31 Dec 2021 14:02 UTC

On 12/31/2021 5:24 AM, Simon Clubley wrote:
> On 2021-12-30, Arne Vajhøj <arne@vajhoej.dk> wrote:
>> On 12/20/2021 2:23 PM, Simon Clubley wrote:
>>> On 2021-12-20, Arne Vajhøj <arne@vajhoej.dk> wrote:
>>>> (Hoff already mentioned that one)
>>>
>>> I missed that. Sorry. :-)
>>
>> And they found yet another vulnerability so now 2.17.1 is out.
>>
>
> On the plus side, at least the discoveries are getting further apart. :-)
>
> As a gentle reminder to everyone, this is what awaits VMS if the
> researchers turn their attention to it. Log4j was in use for years
> and only after researchers turned their attention to it, did these
> longstanding issues get discovered.

It is clear that when some software get a lot of attention then
problems tend to be found.

VMS is not quite as attractive as log4j though.

> I'm sure that when the vulnerable Log4j versions were introduced,
> everyone continued to use it without thinking that they may have
> just introduced a vulnerability into their application.

I believe it has been there since 2.0.

2.x API is different from 1.x API, but 2.x comes with a bridge
that supports 1.x API so maybe old applications that were upgraded
from 1.x to 2.x using the bridge is also impacted.

Obviously people were unaware of the problems.

And the vast majority (like 99.99%) have never used the features
that are causing the problems.

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<sr7q1o$bkl$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19901&group=comp.os.vms#19901

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!SgHyH4t8tRCaz+2rdKhaUw.user.46.165.242.91.POSTED!not-for-mail
From: cornel...@eisner.decus.org (George Cornelius)
Newsgroups: comp.os.vms
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Date: Thu, 6 Jan 2022 22:21:46 -0000 (UTC)
Organization: Aioe.org NNTP Server
Message-ID: <sr7q1o$bkl$1@gioia.aioe.org>
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me> <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com> <61ba084e$0$694$14726298@news.sunsite.dk> <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me> <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com> <j1vcegFtpe0U1@mid.individual.net> <EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com>
Injection-Info: gioia.aioe.org; logging-data="11925"; posting-host="SgHyH4t8tRCaz+2rdKhaUw.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: tin/2.4.3-20181224 ("Glen Mhor") (UNIX) (Linux/4.19.0-18-amd64 (x86_64))
X-Notice: Filtered by postfilter v. 0.9.2
 by: George Cornelius - Thu, 6 Jan 2022 22:21 UTC

David Turner <dturner@islandco.com> wrote:
> It's better than nothing

If it gives you some peace of mind you can try it in the short term.

BTW, some email environments do allow blocking by country of origin,
e.g., Cisco Email Security Appliances. It's something we have chosen
not to use.

But when waiting for a patch to arrive sometimes you grasp at straws.

My home Linux box has Libre Office, and some report writer functionality
had a dependency on log4j and it did not seem to be possible to remove
log4j without using some kind of --force-remove option, although I
suppose I could have just hidden the executable for that portion of
Libre Office.

I see I have the log4j patch in now as part of a routine patch
application, but I don't believe it was there to begin with so I was
exposed for a few days.

George

> I think a lot of US hosting companies also have blocked suspicious
> Russian traffic and will not allow non-US companies to be hosted.
>
> It has certainly helped us.
>

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<61d78151$0$699$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19905&group=comp.os.vms#19905

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Thu, 6 Jan 2022 18:54:54 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.4.1
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
Content-Language: en-US
Newsgroups: comp.os.vms
References: <sp8cvo$6dt$1@dont-email.me>
<61b7f8b8$0$697$14726298@news.sunsite.dk> <spakek$d18$1@dont-email.me>
<K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk>
<r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com> <spdcdm$cap$1@dont-email.me>
<r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
<j1vcegFtpe0U1@mid.individual.net>
<EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com>
<sr7q1o$bkl$1@gioia.aioe.org>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <sr7q1o$bkl$1@gioia.aioe.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 18
Message-ID: <61d78151$0$699$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 1325da05.news.sunsite.dk
X-Trace: 1641513297 news.sunsite.dk 699 arne@vajhoej.dk/68.9.63.232:58419
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Thu, 6 Jan 2022 23:54 UTC

On 1/6/2022 5:21 PM, George Cornelius wrote:
> My home Linux box has Libre Office, and some report writer functionality
> had a dependency on log4j and it did not seem to be possible to remove
> log4j without using some kind of --force-remove option, although I
> suppose I could have just hidden the executable for that portion of
> Libre Office.
>
> I see I have the log4j patch in now as part of a routine patch
> application, but I don't believe it was there to begin with so I was
> exposed for a few days.

log4j is almost everywhere.

But the attack vector in LO must be rather narrow compared to
all the server applications.

Arne

Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228

<d35895fe-9cfe-42c8-a564-4a8aacf74a6fn@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=19906&group=comp.os.vms#19906

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:6214:1d03:: with SMTP id e3mr55657044qvd.77.1641517326497;
Thu, 06 Jan 2022 17:02:06 -0800 (PST)
X-Received: by 2002:a05:620a:b45:: with SMTP id x5mr2153272qkg.641.1641517326258;
Thu, 06 Jan 2022 17:02:06 -0800 (PST)
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Thu, 6 Jan 2022 17:02:05 -0800 (PST)
In-Reply-To: <61d78151$0$699$14726298@news.sunsite.dk>
Injection-Info: google-groups.googlegroups.com; posting-host=73.60.222.222; posting-account=M3IgSwoAAADJd6EnOmsrCCfB6_OyTOkv
NNTP-Posting-Host: 73.60.222.222
References: <sp8cvo$6dt$1@dont-email.me> <61b7f8b8$0$697$14726298@news.sunsite.dk>
<spakek$d18$1@dont-email.me> <K7ydnRi5qLlfxiT8nZ2dnUU7-TWdnZ2d@supernews.com>
<61ba084e$0$694$14726298@news.sunsite.dk> <r_6dnaol3cmDtif8nZ2dnUU7-XmdnZ2d@supernews.com>
<spdcdm$cap$1@dont-email.me> <r_6dnaUl3cmipyf8nZ2dnUU7-XmdnZ2d@supernews.com>
<j1vcegFtpe0U1@mid.individual.net> <EYydnQro9-_9Pyf8nZ2dnUU7-KednZ2d@supernews.com>
<sr7q1o$bkl$1@gioia.aioe.org> <61d78151$0$699$14726298@news.sunsite.dk>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <d35895fe-9cfe-42c8-a564-4a8aacf74a6fn@googlegroups.com>
Subject: Re: Java, log4j, log4shell, and OpenVMS: CVE-2021-44228
From: xyzzy1...@gmail.com (John Reagan)
Injection-Date: Fri, 07 Jan 2022 01:02:06 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Lines: 23
 by: John Reagan - Fri, 7 Jan 2022 01:02 UTC

On Thursday, January 6, 2022 at 6:54:59 PM UTC-5, Arne Vajhøj wrote:
> On 1/6/2022 5:21 PM, George Cornelius wrote:
> > My home Linux box has Libre Office, and some report writer functionality
> > had a dependency on log4j and it did not seem to be possible to remove
> > log4j without using some kind of --force-remove option, although I
> > suppose I could have just hidden the executable for that portion of
> > Libre Office.
> >
> > I see I have the log4j patch in now as part of a routine patch
> > application, but I don't believe it was there to begin with so I was
> > exposed for a few days.
> log4j is almost everywhere.
>
> But the attack vector in LO must be rather narrow compared to
> all the server applications.
>
> Arne
The trouble is that log4j is at such a low level, it is buried in packages that are
buried in other packages that are buried in even more packages. It might take a
while for all of that to be squeezed out.

Pages:123
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor