Now the patch needs patching.  Don't you hate when that happens?

https://arstechnica.com/information-technology/2021/12/patch-fixing-critical-log4j-0-day-has-its-own-vulnerability-thats-under-exploit/

On Wed, 22 Dec 2021, 17:21 Dan Cash, <dan.c...@gmail.com> wrote:

> lol.
>
>
> On Thu, 16 Dec 2021 at 18:13, Dr Greg Low <g...@sqldownunder.com> wrote:
>
>> I chuckled when I saw this again the other day:
>>
>>
>>
>>
>>
>> If only it wasn't true.
>>
>>
>>
>> Regards,
>>
>>
>>
>> Greg
>>
>>
>>
>> Dr Greg Low
>>
>>
>>
>> 1300SQLSQL (1300 775 775) office | +61 419201410 mobile
>>
>> SQL Down Under | Web: https://sqldownunder.com |About me:
>> https://greglow.me
>>
>>
>>
>> *From:* ozdotnet-boun...@ozdotnet.com <ozdotnet-boun...@ozdotnet.com> *On
>> Behalf Of *Greg Keogh
>> *Sent:* Thursday, 16 December 2021 6:00 PM
>> *To:* ozDotNet <ozdotnet@ozdotnet.com>
>> *Subject:* [OT] log4j Internet Doom
>>
>>
>>
>> It's almost Friday ...
>>
>>
>>
>> Many of you might have read the blazing headlines everywhere that the
>> whole Internet is about to crash because of a security vulnerability in
>> log4j. I haven't written Java since early 2001, so I went looking for tech
>> details.
>>
>>
>>
>> It turns out someone wrote an appender (in our log4net terms) that parsed
>> a Uri out of a special bit of syntax, then blindly loaded and ran what was
>> at the Uri. I mean, what could possibly go wrong? I think that this guilty
>> JNDI appender is available by default, that is, it's in the JAR or
>> something like that (I can't get further fine details on that).
>>
>>
>>
>> So it's a bit like *Aircrash Investigations* where it takes multiple
>> things to go wrong and make a bigger wrong.
>>
>>
>>
>> Who could have imagined that a logging library would bring the Internet
>> down?!
>>
>>
>>
>> *Greg*
>>
>
>
> --
> Dan Cash
> -m. 0411 468 779
> -e. dan.c...@gmail.com
>
> F.A.B. Information Systems Pty Ltd   ABN 16 084 146 261
>
>

Reply via email to