Vulnerability CVE-2013-2178


Published: 2013-08-28   Modified: 2013-08-29

Description:
The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban before 0.8.10 do not properly validate log messages, which allows remote attackers to block arbitrary IP addresses via certain messages in a request.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Fail2ban 0.8.9, Denial of Service (Apache rules only)
Krzysztof Katowi...
11.06.2013

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Fail2ban -> Fail2ban 

 References:
https://vndh.net/note:fail2ban-089-denial-service
https://raw.github.com/fail2ban/fail2ban/master/ChangeLog
http://www.openwall.com/lists/oss-security/2013/06/13/7
http://www.debian.org/security/2013/dsa-2708
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:17338
http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html

Copyright 2024, cxsecurity.com

 

Back to Top