CVE-2012-5642

server/action.py in Fail2ban before 0.8.8 does not properly handle the content of the matches tag, which might allow remote attackers to trigger unsafe behavior in a custom action file via unspecified symbols in this content.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fail2ban:fail2ban:*:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.5.5:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.4:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.5:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.6:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.7:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.8:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.9:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.7:*:*:*:*:*:*:*

History

21 Nov 2024, 01:45

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00001.html - () http://lists.opensuse.org/opensuse-updates/2013-04/msg00001.html -
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00002.html - () http://lists.opensuse.org/opensuse-updates/2013-04/msg00002.html -
References () http://sourceforge.net/mailarchive/message.php?msg_id=30193056 - () http://sourceforge.net/mailarchive/message.php?msg_id=30193056 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:078 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:078 -
References () http://www.openwall.com/lists/oss-security/2012/12/17/2 - () http://www.openwall.com/lists/oss-security/2012/12/17/2 -
References () https://bugs.gentoo.org/show_bug.cgi?id=447572 - () https://bugs.gentoo.org/show_bug.cgi?id=447572 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=887914 - () https://bugzilla.redhat.com/show_bug.cgi?id=887914 -
References () https://github.com/fail2ban/fail2ban/commit/83109bc - Patch, Vendor Advisory () https://github.com/fail2ban/fail2ban/commit/83109bc - Patch, Vendor Advisory
References () https://raw.github.com/fail2ban/fail2ban/master/ChangeLog - () https://raw.github.com/fail2ban/fail2ban/master/ChangeLog -

Information

Published : 2012-12-31 11:50

Updated : 2024-11-21 01:45


NVD link : CVE-2012-5642

Mitre link : CVE-2012-5642

CVE.ORG link : CVE-2012-5642


JSON object : View

Products Affected

fail2ban

  • fail2ban