5
CVSSv2

CVE-2006-6302

Published: 06/12/2006 Updated: 29/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

fail2ban 0.7.4 and previous versions does not properly parse sshd log files, which allows remote malicious users to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a login name containing certain strings with an IP address.

Vulnerable Product Search on Vulmon Subscribe to Product

fail2ban fail2ban

Vendor Advisories

Debian Bug report logs - #438187 CVE-2007-4321 remote log injection Package: fail2ban; Maintainer for fail2ban is Yaroslav Halchenko <debian@onerussiancom>; Source for fail2ban is src:fail2ban (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 16 Aug 2007 01:09:02 UTC Severity: normal Tags: ...