DSA-2021-273: Dell EMC ECS Security Update for Apache Log4j Remote Code Execution Vulnerability
摘要: Dell EMC ECS remediation is available for the Apache Log4j Remote Code Execution Vulnerability that could be exploited by malicious users to compromise the affected system. Dell recommends implementing this remediation as soon as possible in light of the critical severity of the vulnerability. ...
本文适用于
本文不适用于
本文并非针对某种特定的产品。
本文并非包含所有产品版本。
影响
Critical
详情
| Third-party Component | CVEs | More information |
| Apache Log4j | CVE-2021-44228 | Apache Log4j Remote Code Execution |
| Apache Log4j | CVE-2021-45046 | |
| Apache Log4j | CVE-2021-45105 | |
| Apache Log4j | CVE-2021-44832 |
| Third-party Component | CVEs | More information |
| Apache Log4j | CVE-2021-44228 | Apache Log4j Remote Code Execution |
| Apache Log4j | CVE-2021-45046 | |
| Apache Log4j | CVE-2021-45105 | |
| Apache Log4j | CVE-2021-44832 |
受影响的产品和补救措施
| Product | Affected Versions | Updated Versions | Link to Update |
| Dell EMC ECS |
3.3.x, 3.4.x, 3.5.x, 3.6.0.x, 3.6.1.x, and 3.6.2.0 | ECS 3.7.0 Note: Apache Log4j is upgraded to 2.17.1. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
| General Patch: 3.3.0.4, 3.4.0.6, 3.5.1.6, 3.6.2.1, 3.6.2.2 Note: Patches disable JNDI lookup class. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
||
| Standalone Patch to “disable JNDI lookup class” for all affected versions. | Apply patch NOTE TO CUSTOMER:
|
Note: Although CVE-2021-45105 and CVE-2021-44832 were not exploitable in ECS, Apache Log4j is upgraded to 2.17.1 in ECS 3.7.0.
| Product | Affected Versions | Updated Versions | Link to Update |
| Dell EMC ECS |
3.3.x, 3.4.x, 3.5.x, 3.6.0.x, 3.6.1.x, and 3.6.2.0 | ECS 3.7.0 Note: Apache Log4j is upgraded to 2.17.1. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
| General Patch: 3.3.0.4, 3.4.0.6, 3.5.1.6, 3.6.2.1, 3.6.2.2 Note: Patches disable JNDI lookup class. |
https://www.dell.com/support/home/en-us/product-support/product/ecs-appliance-/overview |
||
| Standalone Patch to “disable JNDI lookup class” for all affected versions. | Apply patch NOTE TO CUSTOMER:
|
Note: Although CVE-2021-45105 and CVE-2021-44832 were not exploitable in ECS, Apache Log4j is upgraded to 2.17.1 in ECS 3.7.0.
修订历史记录
|
相关信息
法律免责声明
受影响的产品
ECS Appliance产品
ECS, Product Security Information文章属性
文章编号: 000194612
文章类型: Dell Security Advisory
上次修改时间: 05 11月 2025
从其他戴尔用户那里查找问题的答案
支持服务
检查您的设备是否在支持服务涵盖的范围内。