config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html - | |
References | () http://www.debian.org/security/2014/dsa-2979 - | |
References | () http://www.kb.cert.org/vuls/id/686662 - US Government Resource | |
References | () https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821 - Exploit, Patch |
Information
Published : 2014-02-01 15:55
Updated : 2024-11-21 02:00
NVD link : CVE-2013-7176
Mitre link : CVE-2013-7176
CVE.ORG link : CVE-2013-7176
JSON object : View
Products Affected
fail2ban
- fail2ban
CWE
CWE-20
Improper Input Validation