<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Regarding Log4j in Security</title>
    <link>https://community.splunk.com/t5/Security/Regarding-Log4j/m-p/579168#M15794</link>
    <description>&lt;P&gt;Hello everyone,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;So according to the Splunk blog:&amp;nbsp;&lt;A href="https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html" target="_blank" rel="noopener"&gt;Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | Splunk&lt;/A&gt;&amp;nbsp;it says that the affected versions are: "&lt;SPAN&gt;All supported non-Windows versions of 8.1.x and 8.2.x&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;only if&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;DFS is used.&amp;nbsp;"&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm using Splunk Enterprise Search Head &amp;amp; Indexer with version 7.3.1 and I can see various log4j-1.2.17.jar files under location "/bin/jars/vendors/spark/2.3.0/lib/", "/etc/apps/splunk_app_db_connect/bin/lib/",&amp;nbsp;/etc/apps/splunk_archiver/java-bin/jars/vendors/spark/ and etc.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Also, I am attaching the result I received from a search query to determine if DFS is enabled on my Splunk servers.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dfs_splunk.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/17334i694A5CD058063E61/image-size/large?v=v2&amp;amp;px=999" role="button" title="dfs_splunk.png" alt="dfs_splunk.png" /&gt;&lt;/span&gt;&lt;BR /&gt;Should I be concerned about this vulnerability?&amp;nbsp;&lt;BR /&gt;Also to remediate, do I just need to replace this&amp;nbsp;log4j-1.2.17.jar with the latest files directly in the respective directories or do I need to make any changes in the conf files as well?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Any help will be appreciated.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thank you!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Dec 2021 09:22:18 GMT</pubDate>
    <dc:creator>abhi04d</dc:creator>
    <dc:date>2021-12-23T09:22:18Z</dc:date>
    <item>
      <title>Regarding Log4j</title>
      <link>https://community.splunk.com/t5/Security/Regarding-Log4j/m-p/579168#M15794</link>
      <description>&lt;P&gt;Hello everyone,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;So according to the Splunk blog:&amp;nbsp;&lt;A href="https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html" target="_blank" rel="noopener"&gt;Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | Splunk&lt;/A&gt;&amp;nbsp;it says that the affected versions are: "&lt;SPAN&gt;All supported non-Windows versions of 8.1.x and 8.2.x&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;only if&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;DFS is used.&amp;nbsp;"&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm using Splunk Enterprise Search Head &amp;amp; Indexer with version 7.3.1 and I can see various log4j-1.2.17.jar files under location "/bin/jars/vendors/spark/2.3.0/lib/", "/etc/apps/splunk_app_db_connect/bin/lib/",&amp;nbsp;/etc/apps/splunk_archiver/java-bin/jars/vendors/spark/ and etc.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Also, I am attaching the result I received from a search query to determine if DFS is enabled on my Splunk servers.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dfs_splunk.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/17334i694A5CD058063E61/image-size/large?v=v2&amp;amp;px=999" role="button" title="dfs_splunk.png" alt="dfs_splunk.png" /&gt;&lt;/span&gt;&lt;BR /&gt;Should I be concerned about this vulnerability?&amp;nbsp;&lt;BR /&gt;Also to remediate, do I just need to replace this&amp;nbsp;log4j-1.2.17.jar with the latest files directly in the respective directories or do I need to make any changes in the conf files as well?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Any help will be appreciated.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thank you!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Dec 2021 09:22:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Regarding-Log4j/m-p/579168#M15794</guid>
      <dc:creator>abhi04d</dc:creator>
      <dc:date>2021-12-23T09:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding Log4j</title>
      <link>https://community.splunk.com/t5/Security/Regarding-Log4j/m-p/579181#M15795</link>
      <description>&lt;P&gt;Since you're running an unsupported version of Splunk, the guidance in the blog doesn't apply.&amp;nbsp; We can make some reasonable conclusions from it, however.&lt;/P&gt;&lt;P&gt;You're not using DFS so you should be safe.&lt;/P&gt;&lt;P&gt;To be "safer", follow the remediation instructions and remove the vulnerable jar files.&lt;/P&gt;&lt;P&gt;The instructions say nothing about changing config files so no changes are necessary.&lt;/P&gt;&lt;P&gt;To be "safest", upgrade to a version of Splunk that fixes the vulnerability.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Dec 2021 13:16:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Regarding-Log4j/m-p/579181#M15795</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-12-23T13:16:26Z</dc:date>
    </item>
  </channel>
</rss>

