Java Log4J vulnerability
Is the Steam client effected by this vulnerability? If so, when will we expect a patch?
< >
Showing 31-45 of 52 comments
HHH33 Dec 15, 2021 @ 5:48pm 
Originally posted by Satoru:
Originally posted by HHH33:
thanks, is there official notice?

They would have patched their websites.

The steam client itself was never vunlerable
if the client checked for signatures for all downloads I guess that would be true. no idea if it did.
Mr. Hoten  [developer] Dec 16, 2021 @ 2:50pm 
Hi everyone,

We immediately reviewed our services that use log4j and verified that our network security rules blocked downloading and executing untrusted code. We do not believe there are any risks to Steam associated with this vulnerability.

The early discussions about this issue mention Steam specifically, but they were talking strictly about the server side — not the Steam client. It appears the initial reports were using "a DNS lookup occurred" as enough to indicate a potentially-vulnerable system. However we were able to confirm that Steam servers were not at risk of running untrusted external code via this log4j issue.
Crashed Dec 16, 2021 @ 2:54pm 
Originally posted by Mr. Hoten:
Hi everyone,

We immediately reviewed our services that use log4j and verified that our network security rules blocked downloading and executing untrusted code. We do not believe there are any risks to Steam associated with this vulnerability.

The early discussions about this issue mention Steam specifically, but they were talking strictly about the server side — not the Steam client. It appears the initial reports were using "a DNS lookup occurred" as enough to indicate a potentially-vulnerable system. However we were able to confirm that Steam servers were not at risk of running untrusted external code via this log4j issue.
My understanding is that filters are only a stopgap, and that any instances of Log4J should be updated ASAP.
Originally posted by Crashed:
Originally posted by Mr. Hoten:
Hi everyone,

We immediately reviewed our services that use log4j and verified that our network security rules blocked downloading and executing untrusted code. We do not believe there are any risks to Steam associated with this vulnerability.

The early discussions about this issue mention Steam specifically, but they were talking strictly about the server side — not the Steam client. It appears the initial reports were using "a DNS lookup occurred" as enough to indicate a potentially-vulnerable system. However we were able to confirm that Steam servers were not at risk of running untrusted external code via this log4j issue.
My understanding is that filters are only a stopgap, and that any instances of Log4J should be updated ASAP.

:lunar2019deadpanpig:
zxcvbob Dec 16, 2021 @ 3:33pm 
I received the following message from my company's IT director:
"IMMEDIATE ACTION REQUIRED: Uninstall Valve Steam Software to mitigate CRITICAL Log4j Vulnerability"

I don't know if they actually detected a vulnerability, or just did a scan of installed software and Steam is not on their approved list. I uninstalled it; I will be wiping this machine and turning it in next week anyway.
Satoru Dec 16, 2021 @ 6:32pm 
Originally posted by zxcvbob:
I received the following message from my company's IT director:
"IMMEDIATE ACTION REQUIRED: Uninstall Valve Steam Software to mitigate CRITICAL Log4j Vulnerability"

I don't know if they actually detected a vulnerability, or just did a scan of installed software and Steam is not on their approved list. I uninstalled it; I will be wiping this machine and turning it in next week anyway.

I think that was kind of silly

1) The researchers indicated the steam website was vulnerable not that the client itself was
2) I assume your IT director has some kid playing Java minecraft and somehow paniced that Steam used Java (despite you know like it doesn't come with a JRE???)
3) Id be wary of an IT director giving that kind of directive, because it kind of shows they are

a) irrationally reactive
b) technically incompetent

These are things I don't want any IT director to be
Last edited by Satoru; Dec 16, 2021 @ 6:33pm
Satoru Dec 16, 2021 @ 6:41pm 
Originally posted by Snozzberry:
Here's the latest update on the Log4J vulnerability, from a valid source:

https://blog.sucuri.net/2021/12/log4j-vulnerability-the-perfect-holiday-present-that-nobody-wants.html

Patches have been deployed for Apache 2.15.0, and subsequently deployed for 2.16.0 due to block workarounds. Unfortunately, nobody escaped this exploit -- including Valve, Google and Microsoft -- because Apache runs on Java.

I'm glad to see Valve got the patch. Anything that rates a 10/10 is never a good thing.

As indicated by the valve employee above, the researcher have to set up a proof of concept exploit without actually exploiting or runnign code locally as that would be a gross violation of security research protocols (you don't atively try to exploit someone that you aren't giving heads up to)

Thus I think what they likely did was send the command to "do a dns query to this website" this would be fairly innocuous, be allowed through firewalls, but would not actually do anything on the target system. But you'd see "aha this system actually responded to our request". So you'd know the site was running a exploitable version of log4j.

But what would happen in the real world is that the command would try to download and then execute a command locally. Because the edge firewall would reject the download itself, while yes the system would technically execute the command sent in the exploit, it wouldn't actually download the payload meaning nothing actually would happen on the servers.

This is similar to how Valve dodged HeartBleed. Valve encrypts your password BEFORE it goes over the HTTPS tunnel. So while yes, Valves servers were vulnerable to HeartBleed, attackers couldn't see anything useful because your password was encrypted. Sort of ironically there was a thread on the old forums where people were wondering "why do you encrypt the password when its going over an HTTPS tunnel, that seems redundant"
Last edited by Satoru; Dec 16, 2021 @ 6:42pm
zxcvbob Dec 16, 2021 @ 6:44pm 
Originally posted by Satoru:
Originally posted by zxcvbob:
I received the following message from my company's IT director:
"IMMEDIATE ACTION REQUIRED: Uninstall Valve Steam Software to mitigate CRITICAL Log4j Vulnerability"

I don't know if they actually detected a vulnerability, or just did a scan of installed software and Steam is not on their approved list. I uninstalled it; I will be wiping this machine and turning it in next week anyway.

I think that was kind of silly

1) The researchers indicated the steam website was vulnerable not that the client itself was
2) I assume your IT director has some kid playing Java minecraft and somehow panicked that Steam used Java (despite you know like it doesn't come with a JRE???)
3) Id be wary of an IT director giving that kind of directive, because it kind of shows they are

a) irrationally reactive
b) technically incompetent

These are things I don't want any IT director to be

I have a very low opinion of almost anyone with a 'C' in front of their title. (this is a *big* company) But there's not much I can do about it.
Satoru Dec 16, 2021 @ 6:51pm 
Originally posted by Crashed:
Originally posted by Mr. Hoten:
Hi everyone,

We immediately reviewed our services that use log4j and verified that our network security rules blocked downloading and executing untrusted code. We do not believe there are any risks to Steam associated with this vulnerability.

The early discussions about this issue mention Steam specifically, but they were talking strictly about the server side — not the Steam client. It appears the initial reports were using "a DNS lookup occurred" as enough to indicate a potentially-vulnerable system. However we were able to confirm that Steam servers were not at risk of running untrusted external code via this log4j issue.
My understanding is that filters are only a stopgap, and that any instances of Log4J should be updated ASAP.

My reading of that post was to assuage fears of “could someone have hacked valve in the time before patching” and that their interm filters made the exploit more difficult to execute anything useful and thus the probability of the exploit being executed is extremely low between the time of the announcement and when their servers were patched

I don’t think it was “well the edge filters are there so we don’t need to do anything”
Last edited by Satoru; Dec 16, 2021 @ 6:51pm
PocketYoda Dec 16, 2021 @ 7:57pm 
Originally posted by Satoru:
.....

Steam client doesnt' use Java so....

No?

There's a reason why only the Java minecraft community is panicing

It would really only be an issue from a server perspective. But client side you basically aren't doing to be doing anything. I mean yes valve is probably patching apache now but its not a client side problem with steam
It probably has countless other vulnerabilities though if truth be known, The hackers don't exactly like to share these things and neither do companies..

Originally posted by Mr. Hoten:
Hi everyone,

We immediately reviewed our services that use log4j and verified that our network security rules blocked downloading and executing untrusted code. We do not believe there are any risks to Steam associated with this vulnerability.

The early discussions about this issue mention Steam specifically, but they were talking strictly about the server side — not the Steam client. It appears the initial reports were using "a DNS lookup occurred" as enough to indicate a potentially-vulnerable system. However we were able to confirm that Steam servers were not at risk of running untrusted external code via this log4j issue.
Good news thanks.
Last edited by PocketYoda; Dec 16, 2021 @ 7:59pm
Kenzeno Dec 17, 2021 @ 2:53am 
Originally posted by Mr. Hoten:
Hi everyone,

We immediately reviewed our services that use log4j and verified that our network security rules blocked downloading and executing untrusted code. We do not believe there are any risks to Steam associated with this vulnerability.

The early discussions about this issue mention Steam specifically, but they were talking strictly about the server side — not the Steam client. It appears the initial reports were using "a DNS lookup occurred" as enough to indicate a potentially-vulnerable system. However we were able to confirm that Steam servers were not at risk of running untrusted external code via this log4j issue.
Thank you for the statement. Can you also confirm that there is no Log4J version running that is vulnerable?
Crashed Dec 17, 2021 @ 7:08am 
Originally posted by Satoru:
Originally posted by zxcvbob:
I received the following message from my company's IT director:
"IMMEDIATE ACTION REQUIRED: Uninstall Valve Steam Software to mitigate CRITICAL Log4j Vulnerability"

I don't know if they actually detected a vulnerability, or just did a scan of installed software and Steam is not on their approved list. I uninstalled it; I will be wiping this machine and turning it in next week anyway.

I think that was kind of silly

1) The researchers indicated the steam website was vulnerable not that the client itself was
2) I assume your IT director has some kid playing Java minecraft and somehow paniced that Steam used Java (despite you know like it doesn't come with a JRE???)
3) Id be wary of an IT director giving that kind of directive, because it kind of shows they are

a) irrationally reactive
b) technically incompetent

These are things I don't want any IT director to be
Not to mention Minecraft Java Edition quickly got an update to fix the exploit.
tigerg2002us Dec 17, 2021 @ 9:53am 
If no patch to the Steam app and Steam server, where is the Valve and Steam posts that state that? It should be a proud statement in front of the the ads: "Steam is not affected by log4j". When I don't see that, I am concerned!
Crashed Dec 17, 2021 @ 9:55am 
Originally posted by tigerg2002us:
If no patch to the Steam app and Steam server, where is the Valve and Steam posts that state that? It should be a proud statement in front of the the ads: "Steam is not affected by log4j". When I don't see that, I am concerned!
The client doesn't have any Java so it can't be itself affected. The server is something the server operator has to take care of.
Satoru Dec 17, 2021 @ 11:19am 
Originally posted by Snozzberry:
Fair enough, but you don't actively set up a proof of concept exploit unless there's sufficient cause to do so. Minecraft is owned by Microsoft, who is one of Valve's biggest U.S. industry partners... even if it turns out to be nothing, it's better to be safe than sorry.

Its easty to test the exploit on Minecraft because you can download your own client and server and destroy whatever you want on it. You're not impacting MS directly you're destoying your own client and server. That's totally fine.

What you don't do is try to test your vulnerability on a system you dont actively control. Such as the search field on a website.

Edge is built on Microsoft's more secure version of Google's Chromium, on which Valve's Steam Client is built. The firewall would reject the download if the browser's settings were configured properly, in which case the only thing that would get through (worst case scenario) would be a corrupted file named "UNCONFIRMED.CRDOWNLOAD".

I feel like you don't actually understand how this vulnerability works or what log4j is if you're talking about Chromuim.....

Yes and no. Linux was one of the very few OS versions not vulnerable to HeartBleed,

Look I don't really know why you'd say that because I am very very sure I was spending an entire week trying to patch OpenSSL on dozens of LInux machines, linux based appliances. Unless you're telling me the myriad of vendors that were literally throwing patches into my face demining I install this RIGHT NOW was an illusion. HeartBleed was most definitely a major problem on Linux

This is sort of compounded by the fact that while the steam client and CUSTOMER facing websites used encrypted passwrods in the tunnel, the B2B partner website didn't do that and that site had to be changed very quickly
Last edited by Satoru; Dec 17, 2021 @ 11:21am
< >
Showing 31-45 of 52 comments
Per page: 1530 50

Date Posted: Dec 10, 2021 @ 2:46pm
Posts: 52