Java Log4J vulnerability
Is the Steam client effected by this vulnerability? If so, when will we expect a patch?
< >
Mostrando 31-45 de 52 comentarios
HHH33 15 DIC 2021 a las 17:48 
Publicado originalmente por Satoru:
Publicado originalmente por HHH33:
thanks, is there official notice?

They would have patched their websites.

The steam client itself was never vunlerable
if the client checked for signatures for all downloads I guess that would be true. no idea if it did.
Mr. Hoten  [desarrollador] 16 DIC 2021 a las 14:50 
Hi everyone,

We immediately reviewed our services that use log4j and verified that our network security rules blocked downloading and executing untrusted code. We do not believe there are any risks to Steam associated with this vulnerability.

The early discussions about this issue mention Steam specifically, but they were talking strictly about the server side — not the Steam client. It appears the initial reports were using "a DNS lookup occurred" as enough to indicate a potentially-vulnerable system. However we were able to confirm that Steam servers were not at risk of running untrusted external code via this log4j issue.
Crashed 16 DIC 2021 a las 14:54 
Publicado originalmente por Mr. Hoten:
Hi everyone,

We immediately reviewed our services that use log4j and verified that our network security rules blocked downloading and executing untrusted code. We do not believe there are any risks to Steam associated with this vulnerability.

The early discussions about this issue mention Steam specifically, but they were talking strictly about the server side — not the Steam client. It appears the initial reports were using "a DNS lookup occurred" as enough to indicate a potentially-vulnerable system. However we were able to confirm that Steam servers were not at risk of running untrusted external code via this log4j issue.
My understanding is that filters are only a stopgap, and that any instances of Log4J should be updated ASAP.
Judgmental Amaterasu 16 DIC 2021 a las 15:03 
Publicado originalmente por Crashed:
Publicado originalmente por Mr. Hoten:
Hi everyone,

We immediately reviewed our services that use log4j and verified that our network security rules blocked downloading and executing untrusted code. We do not believe there are any risks to Steam associated with this vulnerability.

The early discussions about this issue mention Steam specifically, but they were talking strictly about the server side — not the Steam client. It appears the initial reports were using "a DNS lookup occurred" as enough to indicate a potentially-vulnerable system. However we were able to confirm that Steam servers were not at risk of running untrusted external code via this log4j issue.
My understanding is that filters are only a stopgap, and that any instances of Log4J should be updated ASAP.

:lunar2019deadpanpig:
zxcvbob 16 DIC 2021 a las 15:33 
I received the following message from my company's IT director:
"IMMEDIATE ACTION REQUIRED: Uninstall Valve Steam Software to mitigate CRITICAL Log4j Vulnerability"

I don't know if they actually detected a vulnerability, or just did a scan of installed software and Steam is not on their approved list. I uninstalled it; I will be wiping this machine and turning it in next week anyway.
Satoru 16 DIC 2021 a las 18:32 
Publicado originalmente por zxcvbob:
I received the following message from my company's IT director:
"IMMEDIATE ACTION REQUIRED: Uninstall Valve Steam Software to mitigate CRITICAL Log4j Vulnerability"

I don't know if they actually detected a vulnerability, or just did a scan of installed software and Steam is not on their approved list. I uninstalled it; I will be wiping this machine and turning it in next week anyway.

I think that was kind of silly

1) The researchers indicated the steam website was vulnerable not that the client itself was
2) I assume your IT director has some kid playing Java minecraft and somehow paniced that Steam used Java (despite you know like it doesn't come with a JRE???)
3) Id be wary of an IT director giving that kind of directive, because it kind of shows they are

a) irrationally reactive
b) technically incompetent

These are things I don't want any IT director to be
Última edición por Satoru; 16 DIC 2021 a las 18:33
Satoru 16 DIC 2021 a las 18:41 
Publicado originalmente por Snozzberry:
Here's the latest update on the Log4J vulnerability, from a valid source:

https://blog.sucuri.net/2021/12/log4j-vulnerability-the-perfect-holiday-present-that-nobody-wants.html

Patches have been deployed for Apache 2.15.0, and subsequently deployed for 2.16.0 due to block workarounds. Unfortunately, nobody escaped this exploit -- including Valve, Google and Microsoft -- because Apache runs on Java.

I'm glad to see Valve got the patch. Anything that rates a 10/10 is never a good thing.

As indicated by the valve employee above, the researcher have to set up a proof of concept exploit without actually exploiting or runnign code locally as that would be a gross violation of security research protocols (you don't atively try to exploit someone that you aren't giving heads up to)

Thus I think what they likely did was send the command to "do a dns query to this website" this would be fairly innocuous, be allowed through firewalls, but would not actually do anything on the target system. But you'd see "aha this system actually responded to our request". So you'd know the site was running a exploitable version of log4j.

But what would happen in the real world is that the command would try to download and then execute a command locally. Because the edge firewall would reject the download itself, while yes the system would technically execute the command sent in the exploit, it wouldn't actually download the payload meaning nothing actually would happen on the servers.

This is similar to how Valve dodged HeartBleed. Valve encrypts your password BEFORE it goes over the HTTPS tunnel. So while yes, Valves servers were vulnerable to HeartBleed, attackers couldn't see anything useful because your password was encrypted. Sort of ironically there was a thread on the old forums where people were wondering "why do you encrypt the password when its going over an HTTPS tunnel, that seems redundant"
Última edición por Satoru; 16 DIC 2021 a las 18:42
zxcvbob 16 DIC 2021 a las 18:44 
Publicado originalmente por Satoru:
Publicado originalmente por zxcvbob:
I received the following message from my company's IT director:
"IMMEDIATE ACTION REQUIRED: Uninstall Valve Steam Software to mitigate CRITICAL Log4j Vulnerability"

I don't know if they actually detected a vulnerability, or just did a scan of installed software and Steam is not on their approved list. I uninstalled it; I will be wiping this machine and turning it in next week anyway.

I think that was kind of silly

1) The researchers indicated the steam website was vulnerable not that the client itself was
2) I assume your IT director has some kid playing Java minecraft and somehow panicked that Steam used Java (despite you know like it doesn't come with a JRE???)
3) Id be wary of an IT director giving that kind of directive, because it kind of shows they are

a) irrationally reactive
b) technically incompetent

These are things I don't want any IT director to be

I have a very low opinion of almost anyone with a 'C' in front of their title. (this is a *big* company) But there's not much I can do about it.
Satoru 16 DIC 2021 a las 18:51 
Publicado originalmente por Crashed:
Publicado originalmente por Mr. Hoten:
Hi everyone,

We immediately reviewed our services that use log4j and verified that our network security rules blocked downloading and executing untrusted code. We do not believe there are any risks to Steam associated with this vulnerability.

The early discussions about this issue mention Steam specifically, but they were talking strictly about the server side — not the Steam client. It appears the initial reports were using "a DNS lookup occurred" as enough to indicate a potentially-vulnerable system. However we were able to confirm that Steam servers were not at risk of running untrusted external code via this log4j issue.
My understanding is that filters are only a stopgap, and that any instances of Log4J should be updated ASAP.

My reading of that post was to assuage fears of “could someone have hacked valve in the time before patching” and that their interm filters made the exploit more difficult to execute anything useful and thus the probability of the exploit being executed is extremely low between the time of the announcement and when their servers were patched

I don’t think it was “well the edge filters are there so we don’t need to do anything”
Última edición por Satoru; 16 DIC 2021 a las 18:51
PocketYoda 16 DIC 2021 a las 19:57 
Publicado originalmente por Satoru:
.....

Steam client doesnt' use Java so....

No?

There's a reason why only the Java minecraft community is panicing

It would really only be an issue from a server perspective. But client side you basically aren't doing to be doing anything. I mean yes valve is probably patching apache now but its not a client side problem with steam
It probably has countless other vulnerabilities though if truth be known, The hackers don't exactly like to share these things and neither do companies..

Publicado originalmente por Mr. Hoten:
Hi everyone,

We immediately reviewed our services that use log4j and verified that our network security rules blocked downloading and executing untrusted code. We do not believe there are any risks to Steam associated with this vulnerability.

The early discussions about this issue mention Steam specifically, but they were talking strictly about the server side — not the Steam client. It appears the initial reports were using "a DNS lookup occurred" as enough to indicate a potentially-vulnerable system. However we were able to confirm that Steam servers were not at risk of running untrusted external code via this log4j issue.
Good news thanks.
Última edición por PocketYoda; 16 DIC 2021 a las 19:59
Kenzeno 17 DIC 2021 a las 2:53 
Publicado originalmente por Mr. Hoten:
Hi everyone,

We immediately reviewed our services that use log4j and verified that our network security rules blocked downloading and executing untrusted code. We do not believe there are any risks to Steam associated with this vulnerability.

The early discussions about this issue mention Steam specifically, but they were talking strictly about the server side — not the Steam client. It appears the initial reports were using "a DNS lookup occurred" as enough to indicate a potentially-vulnerable system. However we were able to confirm that Steam servers were not at risk of running untrusted external code via this log4j issue.
Thank you for the statement. Can you also confirm that there is no Log4J version running that is vulnerable?
Crashed 17 DIC 2021 a las 7:08 
Publicado originalmente por Satoru:
Publicado originalmente por zxcvbob:
I received the following message from my company's IT director:
"IMMEDIATE ACTION REQUIRED: Uninstall Valve Steam Software to mitigate CRITICAL Log4j Vulnerability"

I don't know if they actually detected a vulnerability, or just did a scan of installed software and Steam is not on their approved list. I uninstalled it; I will be wiping this machine and turning it in next week anyway.

I think that was kind of silly

1) The researchers indicated the steam website was vulnerable not that the client itself was
2) I assume your IT director has some kid playing Java minecraft and somehow paniced that Steam used Java (despite you know like it doesn't come with a JRE???)
3) Id be wary of an IT director giving that kind of directive, because it kind of shows they are

a) irrationally reactive
b) technically incompetent

These are things I don't want any IT director to be
Not to mention Minecraft Java Edition quickly got an update to fix the exploit.
tigerg2002us 17 DIC 2021 a las 9:53 
If no patch to the Steam app and Steam server, where is the Valve and Steam posts that state that? It should be a proud statement in front of the the ads: "Steam is not affected by log4j". When I don't see that, I am concerned!
Crashed 17 DIC 2021 a las 9:55 
Publicado originalmente por tigerg2002us:
If no patch to the Steam app and Steam server, where is the Valve and Steam posts that state that? It should be a proud statement in front of the the ads: "Steam is not affected by log4j". When I don't see that, I am concerned!
The client doesn't have any Java so it can't be itself affected. The server is something the server operator has to take care of.
Satoru 17 DIC 2021 a las 11:19 
Publicado originalmente por Snozzberry:
Fair enough, but you don't actively set up a proof of concept exploit unless there's sufficient cause to do so. Minecraft is owned by Microsoft, who is one of Valve's biggest U.S. industry partners... even if it turns out to be nothing, it's better to be safe than sorry.

Its easty to test the exploit on Minecraft because you can download your own client and server and destroy whatever you want on it. You're not impacting MS directly you're destoying your own client and server. That's totally fine.

What you don't do is try to test your vulnerability on a system you dont actively control. Such as the search field on a website.

Edge is built on Microsoft's more secure version of Google's Chromium, on which Valve's Steam Client is built. The firewall would reject the download if the browser's settings were configured properly, in which case the only thing that would get through (worst case scenario) would be a corrupted file named "UNCONFIRMED.CRDOWNLOAD".

I feel like you don't actually understand how this vulnerability works or what log4j is if you're talking about Chromuim.....

Yes and no. Linux was one of the very few OS versions not vulnerable to HeartBleed,

Look I don't really know why you'd say that because I am very very sure I was spending an entire week trying to patch OpenSSL on dozens of LInux machines, linux based appliances. Unless you're telling me the myriad of vendors that were literally throwing patches into my face demining I install this RIGHT NOW was an illusion. HeartBleed was most definitely a major problem on Linux

This is sort of compounded by the fact that while the steam client and CUSTOMER facing websites used encrypted passwrods in the tunnel, the B2B partner website didn't do that and that site had to be changed very quickly
Última edición por Satoru; 17 DIC 2021 a las 11:21
< >
Mostrando 31-45 de 52 comentarios
Por página: 1530 50

Publicado el: 10 DIC 2021 a las 14:46
Mensajes: 52