Here we go again... (Internet Vulnerability Apache Log4j)

The explanation is that the vulnerability allows for a piece of executable code to be triggered by a log. Code like malware. But that malware has to exist on the machine itself. The log vulnerability wouldn't put it there. So they said to take extra care not to click on any suspicious links or download attachments that don't look right or are from untrusted sources. The usual common sense stuff, but more urgent now, perhaps.

Except (and this is the really bad part) the exploit takes advantage of a Java feature that allows the compromised code to download anything EvilTeam wants and run it as that user, without any action on the user's part. This is kind of like the Pegasus exploit of iMessages in iPhones that allowed remote control of anyone's phone without the user doing anything.

Big issue, because you have no control unless you can block the downloads (or patch).
 
Last edited:
Back
Top Bottom