Lucene search

K
debianDebianDEBIAN:DLA-0021-1:D1F7A
HistoryJul 26, 2014 - 10:35 a.m.

[DLA-0021-1] fail2ban security update

2014-07-2610:35:59
lists.debian.org
6

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.2 Medium

AI Score

Confidence

Low

0.017 Low

EPSS

Percentile

87.9%

Package : fail2ban
Version : 0.8.4-3+squeeze3
CVE ID : CVE-2013-7176 CVE-2013-7177

  • Use anchored failregex for filters to avoid possible DoS. Manually
    picked up from the current status of 0.8 branch (as of
    0.8.13-29-g09b2016):
    • CVE-2013-7176: postfix.conf - anchored on the front, expects
      "postfix/smtpd" prefix in the log line
    • CVE-2013-7177: cyrus-imap.conf - anchored on the front, and
      refactored to have a single failregex
    • couriersmtp.conf - anchored on both sides
    • exim.conf - front-anchored versions picked up from exim.conf
      and exim-spam.conf
    • lighttpd-fastcgi.conf - front-anchored picked up from suhosin.conf
      (copied from the Wheezy version)
  • Catch also failed logins via secured (imaps/pop3s) for cyrus-imap.
    Regression was introduced while strengthening failregex in 0.8.11 (bd175f)
    Debian bug #755173
  • cyrus-imap: catch "user not found" attempts
OSVersionArchitecturePackageVersionFilename
Debian6allfail2ban< 0.8.4-3+squeeze3fail2ban_0.8.4-3+squeeze3_all.deb
Debian7allfail2ban< 0.8.6-3wheezy3fail2ban_0.8.6-3wheezy3_all.deb

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.2 Medium

AI Score

Confidence

Low

0.017 Low

EPSS

Percentile

87.9%