Computer Security
[EN] securityvulns.ru no-pyccku


DoS via fail2ban
Published:21.07.2014
Source:
SecurityVulns ID:13869
Type:remote
Threat Level:
5/10
Description:Invalid logs parsing allows to ban arbitrary hosts.
Affected:FAIL2BAN : fail2ban 0.8
CVE:CVE-2013-7177 (config/filter.d/cyrus-imap.conf in the cyrus-imap filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.)
 CVE-2013-7176 (config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2979-1] fail2ban security update (21.07.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod