<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="2967710.xsl"?>
<?xml-stylesheet type="text/css" href="2967708.css"?>
<cvrf:cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
   <DocumentTitle xml:lang="en">Oracle Security Alert for CVE-2021-44228 - Oracle CVRF</DocumentTitle>
   <DocumentType xml:lang="en">Oracle Security Alert</DocumentType>
   <DocumentPublisher Type="Vendor"/>
   <DocumentTracking>
      <Identification>
         <ID>CVE-2021-44228</ID>
      </Identification>
      <Status>Final</Status>
      <Version>3</Version>
      <RevisionHistory>
         <Revision>
            <Number>3</Number>
            <Date>2021-12-17T11:35:00-07:00</Date>
            <Description>Updated CVSS score for CVE-2021-45046.</Description>
         </Revision>
      </RevisionHistory>
      <InitialReleaseDate>2021-12-10T17:00:00-07:00</InitialReleaseDate>
      <CurrentReleaseDate>2021-12-17T11:35:00-07:00</CurrentReleaseDate>
   </DocumentTracking>
   <DocumentNotes>
      <Note Audience="All" Ordinal="1" Title="Summary" Type="Summary" xml:lang="en">This document contains descriptions of Oracle product security vulnerabilities which have had security patches released for all supported versions and platforms for the associated product.  Additional information regarding these vulnerabilities including security patch distribution information can be found at the Oracle sites referenced in this document.</Note>
   </DocumentNotes>
   <DocumentDistribution>This document is published at: https://www.oracle.com/a/tech/docs/cve-2021-44228cvrf.xml</DocumentDistribution>
   <DocumentReferences>
      <Reference Type="External">
         <URL>https://www.oracle.com/security-alerts/alert-cve-2021-44228.html</URL>
         <Description>URL to html version of Advisory</Description>
      </Reference>
   </DocumentReferences>
   <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
      <Branch Name="Oracle" Type="Vendor">
         <Branch Name="Third Party Component" Type="Product Family">
            <Branch Name="Dependent Product" Type="Product Name">
               <Branch Name="2.0 - 2.14.1" Type="Product Version">
                  <FullProductName ProductID="P-10787V-2.0 - 2.14.1">Dependent Product Version 2.0 - 2.14.1</FullProductName>
               </Branch>
               <Branch Name="2.0 - 2.15.0" Type="Product Version">
                  <FullProductName ProductID="P-10787V-2.0 - 2.15.0">Dependent Product Version 2.0 - 2.15.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
      </Branch>
   </ProductTree>
   <Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-44228</Title>
      <Notes>
         <Note Audience="All" Ordinal="1" Title="Details" Type="Details">Vulnerability in the Apache Log4j product of Third Party Component (component: All).  Supported versions that are affected are 2.0 - 2.14.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Apache Log4j.  While the vulnerability is in Apache Log4j, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Apache Log4j. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-44228</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10787V-2.0 - 2.14.1</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore> 10.0</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Dependent Product</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2827611.1</URL>
            <ProductID>P-10787V-2.0 - 2.14.1</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
   <Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2021-45046</Title>
      <Notes>
         <Note Audience="All" Ordinal="2" Title="Details" Type="Details">Vulnerability in the Apache Log4j product of Third Party Component (component: All).  Supported versions that are affected are 2.0 - 2.15.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Apache Log4j.  While the vulnerability is in Apache Log4j, attacks may significantly impact additional products.  Successful attacks of this vulnerability can result in takeover of Apache Log4j. CVSS 3.1 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Security patch has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2021-45046</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-10787V-2.0 - 2.15.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.0</BaseScore>
            <Vector>AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Patch">
            <Description>Dependent Product</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://support.oracle.com/rs?type=doc&amp;amp;id=2827611.1</URL>
            <ProductID>P-10787V-2.0 - 2.15.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
</cvrf:cvrfdoc>
