Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2021.0253 Microsoft security update release for CVE-2021-44228 17 December 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Azure Spring Cloud Azure Databricks Azure DevOps Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-45046 CVE-2021-44228 Reference: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-44228 OVERVIEW Microsoft is aware of a vulnerability affecting Apache Log4j2 which, if exploited, allows an attacker who is able to control log messages or log message parameters to execute arbitrary code.[1] IMPACT Microsoft states "Successful exploitation allows for arbitrary code execution in the targeted application. Attackers do not need prior access to the system to log the string and can remotely cause the logging event by using commands like curl against a target system to log the malicious string in the application log. When processing the log, the vulnerable system reads the string and executes it, which in current attacks is used to execute the code from the malicious domain. Doing so can grant the attacker full access and control of the affected application." [2] The following vulnerability has been addressed: CVE-2021-44228 CVE-2021-45046 MITIGATION It is advised to upgrade the affected products to the latest release.[1] REFERENCES [1] Microsoft update on CVE-2021-44228 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-44228 [2] Guidance on affected products https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYbwT6+NLKJtyKPYoAQgqsA//VUjyHvHDvpUgyH44f86PXpQTd/82E67M 2w7VcZbtlHMSy/G2R8mS+bcMlhqP7q2KnHq7VimjhCW8ASrPQThwftbX5dD97Yxp Fbc6cBkW9mi8H/QR2LrJv1o7EQfvBEtOWs8vEiodQjHbdGR0BU4tFTXvyk/bkF5Z Ff0/+E0cA/zzwVZ+rTd91cxvwD9KXTpGfX7QCHy72ISRwMbYul0C3rN6ct576uyA agtNgVuvYljTqXQYYK98Twcd+5MWku/6FxiiKcg9ZWkPUS6JQ4Uv5tnycNxLvgJ7 5TKyCM4Ck+Eeoc4QPOpzrRvBEaz2vTf7cOzQ9vehrsp6zfb23/BxYI67w4u1Rl+e JTDiG3p4JUdEBXSlZAlae4B1kd/AILZeDTfCmMJA7XtI+Ue1SJNiWFwEgNJyGbwd CWfjVhfN5SW0voFfWpBq7r5jT05B2lK0K0yAlZnSRiCsKtehp51k6I5dsbUSE0uG DGDAqv9qz4DnY3ris/icLvf16i80+q71BIANETeU2uV59RWjMuzFUqRuZ6hC5QPx UpZlQhZSL8AKC0V1xxC7SPfcOc1s7gZsE4wW0Yk+BWuDwGURbrhM7Yyde3fzM8Ox ZfMXMbsTn/GJgxVpQkc/JYmYlvNWPFmICj7I3YOo8zHBY4kBpHSTUy0Y2qangnY/ Sw2FRz69hxU= =P82C -----END PGP SIGNATURE-----