ID CVE-2012-5642
Summary server/action.py in Fail2ban before 0.8.8 does not properly handle the content of the matches tag, which might allow remote attackers to trigger unsafe behavior in a custom action file via unspecified symbols in this content.
References
Vulnerable Configurations
  • cpe:2.3:a:fail2ban:fail2ban:0.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.7.8:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.7.9:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.7.9:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:fail2ban:fail2ban:0.8.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:fail2ban:fail2ban:0.8.7.1:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 05-12-2013 - 05:20)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm
mandriva MDVSA-2013:078
mlist
  • [fail2ban-users] 20121206 0.8.8 release
  • [oss-security] 20121217 Re: CVE request: fail2ban 0.8.8 fixes an input variable quoting flaw on content
suse
  • openSUSE-SU-2013:0566
  • openSUSE-SU-2013:0567
Last major update 05-12-2013 - 05:20
Published 31-12-2012 - 11:50
Last modified 05-12-2013 - 05:20
Back to Top