7.5
CVSSv2

CVE-2012-5642

Published: 31/12/2012 Updated: 05/12/2013
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

server/action.py in Fail2ban prior to 0.8.8 does not properly handle the content of the matches tag, which might allow remote malicious users to trigger unsafe behavior in a custom action file via unspecified symbols in this content.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fail2ban fail2ban 0.8.4

fail2ban fail2ban 0.8.3

fail2ban fail2ban 0.7.6

fail2ban fail2ban 0.7.5

fail2ban fail2ban 0.5.5

fail2ban fail2ban 0.5.4

fail2ban fail2ban 0.8.6

fail2ban fail2ban 0.8.5

fail2ban fail2ban 0.7.8

fail2ban fail2ban 0.7.7

fail2ban fail2ban 0.6.1

fail2ban fail2ban 0.6.0

fail2ban fail2ban 0.4.1

fail2ban fail2ban 0.4.0

fail2ban fail2ban

fail2ban fail2ban 0.8.7

fail2ban fail2ban 0.8.0

fail2ban fail2ban 0.7.9

fail2ban fail2ban 0.7.1

fail2ban fail2ban 0.7.0

fail2ban fail2ban 0.5.1

fail2ban fail2ban 0.5.0

fail2ban fail2ban 0.1.0

fail2ban fail2ban 0.3.1

fail2ban fail2ban 0.3.0

fail2ban fail2ban 0.8.2

fail2ban fail2ban 0.8.1

fail2ban fail2ban 0.7.4

fail2ban fail2ban 0.7.3

fail2ban fail2ban 0.7.2

fail2ban fail2ban 0.5.3

fail2ban fail2ban 0.5.2

fail2ban fail2ban 0.1.2

fail2ban fail2ban 0.1.1

Vendor Advisories

Debian Bug report logs - #696184 fail2ban: CVE-2012-5642: input variable quoting flaw on <matches> content Package: fail2ban; Maintainer for fail2ban is Yaroslav Halchenko <debian@onerussiancom>; Source for fail2ban is src:fail2ban (PTS, buildd, popcon) Reported by: Henri Salo <henri@nervfi> Date: Mon, 17 Dec ...