Upstream information
Description
The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban before 0.8.10 do not properly validate log messages, which allows remote attackers to block arbitrary IP addresses via certain messages in a request.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 5 |
Vector | AV:N/AC:L/Au:N/C:N/I:N/A:P |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
- openSUSE-SU-2013:1120-1, published Tue, 2 Jul 2013 12:04:55 +0200 (CEST)
- openSUSE-SU-2013:1121-1, published Tue, 2 Jul 2013 13:04:13 +0200 (CEST)
- openSUSE-SU-2014:0348-1, published Sat, 8 Mar 2014 20:04:13 +0100 (CET)
- openSUSE-SU-2014:0493-1, published Tue, 8 Apr 2014 21:04:13 +0200 (CEST)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
openSUSE Tumbleweed |
| Patchnames: openSUSE Tumbleweed GA SuSEfirewall2-fail2ban-0.9.5-1.1 |