The Apache Log4j vulnerability (CVE-2021-44228) affects the z/Transaction Processing Facility (z/TPF) system and TPF Operations Server. Several Java applications on the z/TPF system depend on Apache Log4j capabilities. Additionally, the 64-bit Java support in TPF Operations Server uses Apache Log4j capabilities. All components in the z/TPF system and TPF Operations Server that use Apache Log4j have been updated to use Apache Log4j 2.16.0.
CVEID:CVE-2021-44228
**DESCRIPTION:**Apache Log4j could allow a remote attacker to execute arbitrary code on the system, caused by the failure to protect against attacker controlled LDAP and other JNDI related endpoints by JNDI features. By sending a specially crafted code string, an attacker could exploit this vulnerability to load arbitrary Java code on the server and take complete control of the system. Note: The vulnerability is also called Log4Shell or LogJam.
CVSS Base score: 10
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/214921 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Affected Product(s) | Version(s) |
---|---|
z/Transaction Processing Facility | 1.1 |
TPF Operations Server | 1.2.06 |
Product | VRMF | APAR | Remediation/First Fix |
---|---|---|---|
z/TPF | 1.1 | PJ46688 | Apply the APAR, which is available for download from the TPF Family Products: Maintenance for z/TPF & z/TPFDF web page. |
TPF Operations Server | 1.2.06 | IT39419 |
Apply the APAR, which is available for download from the TPF Product Family: Maintenance for TPF Operations Server web page.
None.