As always Colin, fantastic video and nice deep dive depth. I've got to say I don't understand most of the details, but it gives me a pretty good idea that I've got lots to learn. Looking forward to your next reverse engineering analysis video with tools just like old times :D
Thank you Colin. As always your analysis is most mature and extensive. Thank you for your breakdown and careful and brilliant analysis my friend! I am most concerned how embedded this threat is and how wide-spread it is. Apache is everywhere and RCE is such a serious threat. I wonder how long this zero-day has been known by Threat Actors? Nonetheless thank you and I am hoping everyone properly updates their infrastructure accordingly.
Does Oracle use log4j for Java VM/JDK development and could the whole Java environment be compromised? Did they use Java tools (with log4j) for Oracle database development?
Colin, seeing 2.22 as the version we have installed , slightly confused if that version is simply a misenturpreted 2.2 therfore < than 2.15 or actually later version than 2.15. is there any way of knowing?
Super interesting video! I'd love to see a breakdown of the NSO zero click imessage exploit. I read the google project zero blog post on it but can't wrap my head around the virtual CPU part.
Farming turnips looks more attractive by day. Thanks for the vid 👨🏾💻
haha, that's the dream.
Yup
As always Colin, fantastic video and nice deep dive depth. I've got to say I don't understand most of the details, but it gives me a pretty good idea that I've got lots to learn. Looking forward to your next reverse engineering analysis video with tools just like old times :D
Thanks man! Likewise I’m looking forward to more of your content which I always enjoy.
so if java is not installed on a system it's reasonable to assume the system is not vulnerable?
A ton of services might pack in their own preferred version of java so it might not be as simple as making sure java is not installed system-wide.
Thanks Colin Happy Holidays
Likewise to you too.
Thank you Colin. As always your analysis is most mature and extensive. Thank you for your breakdown and careful and brilliant analysis my friend! I am most concerned how embedded this threat is and how wide-spread it is. Apache is everywhere and RCE is such a serious threat. I wonder how long this zero-day has been known by Threat Actors? Nonetheless thank you and I am hoping everyone properly updates their infrastructure accordingly.
Thanks Kevin, keep well and wishing you a peaceful Xmas.
@@cybercdh You too!
Better mitigation is removal of Java and looking for other vendor Implementation(mostly runtime)
It’s surprising how much Java is still very much under pinning so many platforms.
Java is still everywhere, especially if you support SAP.:)
Openjdk
So if your company has billions of dollars at stake and millions of lines of code running, just turn it all off and take a nap.
Does Oracle use log4j for Java VM/JDK development and could the whole Java environment be compromised? Did they use Java tools (with log4j) for Oracle database development?
Thanks Colin, great video!
Cheers dude, hope you’re well.
Colin, seeing 2.22 as the version we have installed , slightly confused if that version is simply a misenturpreted 2.2 therfore < than 2.15 or actually later version than 2.15. is there any way of knowing?
Thank you for breaking this down
Thanks for this informative breakdown
Glad it was helpful!
The British NCSC directed to ask Oracle and NO ANSWER from USA equivalent....
Thanks for great video !!
thanks for the post. Very much appreciated.
Super interesting video! I'd love to see a breakdown of the NSO zero click imessage exploit. I read the google project zero blog post on it but can't wrap my head around the virtual CPU part.
Yeh for sure, that exploit is from a different planet.
As always, informative and to the point , tHANkYou.
thank you for breaking it down
Why don’t companies write their own logger instead of using these bloated pieces of $hit.
is log4j1 effected?
No
Error
Once again a stupid and unnecessary added "feature" creates a security nightmare.
i dislike
...teeth...