CVE-2006-6302

fail2ban 0.7.4 and earlier does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a login name containing certain strings with an IP address.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fail2ban:fail2ban:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=157166 - () http://bugs.gentoo.org/show_bug.cgi?id=157166 -
References () http://secunia.com/advisories/23237 - Vendor Advisory () http://secunia.com/advisories/23237 - Vendor Advisory
References () http://secunia.com/advisories/24184 - Vendor Advisory () http://secunia.com/advisories/24184 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200702-05.xml - () http://security.gentoo.org/glsa/glsa-200702-05.xml -
References () http://www.securityfocus.com/bid/21469 - () http://www.securityfocus.com/bid/21469 -
References () http://www.vupen.com/english/advisories/2006/4877 - () http://www.vupen.com/english/advisories/2006/4877 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30739 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30739 -

Information

Published : 2006-12-06 19:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6302

Mitre link : CVE-2006-6302

CVE.ORG link : CVE-2006-6302


JSON object : View

Products Affected

fail2ban

  • fail2ban