fail2ban 0.8 and earlier does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a client protocol version identification containing an IP address string, a different vector than CVE-2006-6302.
References
Configurations
History
21 Nov 2024, 00:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.gentoo.org/show_bug.cgi?id=181214 - | |
References | () http://osvdb.org/42484 - | |
References | () http://secunia.com/advisories/23237 - | |
References | () http://secunia.com/advisories/28374 - | |
References | () http://security.gentoo.org/glsa/glsa-200707-13.xml - | |
References | () http://www.debian.org/security/2008/dsa-1456 - | |
References | () http://www.ossec.net/en/attacking-loganalysis.html - | |
References | () http://www.securityfocus.com/bid/25117 - |
Information
Published : 2007-08-14 00:17
Updated : 2024-11-21 00:35
NVD link : CVE-2007-4321
Mitre link : CVE-2007-4321
CVE.ORG link : CVE-2007-4321
JSON object : View
Products Affected
fail2ban
- fail2ban
CWE