Vulnerability CVE-2012-5642


Published: 2012-12-31

Description:
server/action.py in Fail2ban before 0.8.8 does not properly handle the content of the matches tag, which might allow remote attackers to trigger unsafe behavior in a custom action file via unspecified symbols in this content.

Type:

CWE-noinfo

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Fail2ban -> Fail2ban 

 References:
https://github.com/fail2ban/fail2ban/commit/83109bc
https://raw.github.com/fail2ban/fail2ban/master/ChangeLog
https://bugzilla.redhat.com/show_bug.cgi?id=887914
https://bugs.gentoo.org/show_bug.cgi?id=447572
http://www.openwall.com/lists/oss-security/2012/12/17/2
http://www.mandriva.com/security/advisories?name=MDVSA-2013:078
http://sourceforge.net/mailarchive/message.php?msg_id=30193056
http://lists.opensuse.org/opensuse-updates/2013-04/msg00002.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00001.html

Copyright 2024, cxsecurity.com

 

Back to Top