6.8
CVSSv2

CVE-2007-4321

Published: 14/08/2007 Updated: 31/10/2012
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

fail2ban 0.8 and previous versions does not properly parse sshd log files, which allows remote malicious users to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a client protocol version identification containing an IP address string, a different vector than CVE-2006-6302.

Vulnerable Product Search on Vulmon Subscribe to Product

fail2ban fail2ban 0.8

Vendor Advisories

Debian Bug report logs - #438187 CVE-2007-4321 remote log injection Package: fail2ban; Maintainer for fail2ban is Yaroslav Halchenko <debian@onerussiancom>; Source for fail2ban is src:fail2ban (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 16 Aug 2007 01:09:02 UTC Severity: normal Tags: ...
Daniel B Cid discovered that fail2ban, a tool to block IP addresses that cause login failures, is too liberal about parsing SSH log files, allowing an attacker to block any IP address The old stable distribution (sarge) doesn't contain fail2ban For the stable distribution (etch), this problem has been fixed in version 075-2etch1 For the ...

Exploits

source: wwwsecurityfocuscom/bid/25117/info Fail2ban is prone to a remote denial-of-service vulnerability because the application fails to properly ensure the validity of authentication-failure messages Successfully exploiting this issue allows remote attackers to add arbitrary IP addresses to the block list used by the application This ...