fail2ban 0.7.4 and earlier does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a login name containing certain strings with an IP address.
References
Configurations
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.gentoo.org/show_bug.cgi?id=157166 - | |
References | () http://secunia.com/advisories/23237 - Vendor Advisory | |
References | () http://secunia.com/advisories/24184 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200702-05.xml - | |
References | () http://www.securityfocus.com/bid/21469 - | |
References | () http://www.vupen.com/english/advisories/2006/4877 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30739 - |
Information
Published : 2006-12-06 19:28
Updated : 2024-11-21 00:22
NVD link : CVE-2006-6302
Mitre link : CVE-2006-6302
CVE.ORG link : CVE-2006-6302
JSON object : View
Products Affected
fail2ban
- fail2ban
CWE