CVE-2023-6481
Logback "receiver" DOS vulnerability CVE-2023-6378 incomplete fix
Severity Score
Exploit Likelihood
Affected Versions
3Public Exploits
0Exploited in Wild
-Decision
Descriptions
A serialization vulnerability in logback receiver component part of logback version 1.4.13, 1.3.13 and 1.2.12 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
Una vulnerabilidad de serializaciĆ³n en el componente Logback Receiver. Las versiones 1.4.13, 1.3.13 y 1.2.12 de Logback permite a un atacante montar un ataque de denegaciĆ³n de servicio enviando datos envenenados.
A flaw was found in the logback package. Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') via the logback receiver component. This flaw allows an attacker to mount a denial-of-service attack by sending poisoned data.
A serialization vulnerability in logback receiver component part of logback version 1.4.13, 1.3.13 and 1.2.12 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
Red Hat OpenShift Serverless version 1.31.1 is now available. Issues addressed include denial of service and traversal vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-12-04 CVE Reserved
- 2023-12-04 CVE Published
- 2024-08-02 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (4)
URL | Date | SRC |
---|
URL | Date | SRC |
---|