Upstream information

CVE-2013-7176 at MITRE


config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 861503 [RESOLVED / DUPLICATE]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • SuSEfirewall2-fail2ban >= 0.9.5-1.1
  • fail2ban >= 0.9.5-1.1
  • nagios-plugins-fail2ban >= 0.9.5-1.1
openSUSE Tumbleweed GA SuSEfirewall2-fail2ban-0.9.5-1.1