Lucene search

K
mageiaGentoo FoundationMGASA-2013-0192
HistoryJul 01, 2013 - 11:09 p.m.

Updated fail2ban packages fix CVE-2013-2178

2013-07-0123:09:27
Gentoo Foundation
advisories.mageia.org
10

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.017

Percentile

87.7%

Krzysztof Katowicz-Kowalewski discovered a vulnerability in Fail2ban, a log monitoring and system which can act on attack by preventing hosts to connect to specified services using the local firewall. When using Fail2ban to monitor Apache logs, improper input validation in log parsing could enable a remote attacker to trigger an IP ban on arbitrary addresses, thus causing a denial of service (CVE-2013-2178).

OSVersionArchitecturePackageVersionFilename
Mageia2noarchfail2ban< 0.8.6-3.2fail2ban-0.8.6-3.2.mga2
Mageia3noarchfail2ban< 0.8.8-6.1fail2ban-0.8.8-6.1.mga3

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.017

Percentile

87.7%