Lucene search

K
ibmIBMEF5F7BA296D0A7B4B6CC058D9B89B1BFEE714F79C2BC4541813DA99A292450B9
HistoryDec 20, 2021 - 8:53 p.m.

Security Bulletin: The Apache Log4j (CVE-2021-44228) vulnerability affects z/TPF and TPF Operations Server

2021-12-2020:53:23
www.ibm.com
120

0.976 High

EPSS

Percentile

100.0%

Summary

The Apache Log4j vulnerability (CVE-2021-44228) affects the z/Transaction Processing Facility (z/TPF) system and TPF Operations Server. Several Java applications on the z/TPF system depend on Apache Log4j capabilities. Additionally, the 64-bit Java support in TPF Operations Server uses Apache Log4j capabilities. All components in the z/TPF system and TPF Operations Server that use Apache Log4j have been updated to use Apache Log4j 2.16.0.

Vulnerability Details

CVEID:CVE-2021-44228
**DESCRIPTION:**Apache Log4j could allow a remote attacker to execute arbitrary code on the system, caused by the failure to protect against attacker controlled LDAP and other JNDI related endpoints by JNDI features. By sending a specially crafted code string, an attacker could exploit this vulnerability to load arbitrary Java code on the server and take complete control of the system. Note: The vulnerability is also called Log4Shell or LogJam.
CVSS Base score: 10
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/214921 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
z/Transaction Processing Facility 1.1
TPF Operations Server 1.2.06

Remediation/Fixes

Product VRMF APAR Remediation/First Fix
z/TPF 1.1 PJ46688 Apply the APAR, which is available for download from the TPF Family Products: Maintenance for z/TPF & z/TPFDF web page.
TPF Operations Server 1.2.06 IT39419

Apply the APAR, which is available for download from the TPF Product Family: Maintenance for TPF Operations Server web page.

Workarounds and Mitigations

None.

CPENameOperatorVersion
tpfeq1.1