Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-32749
HistoryJul 16, 2021 - 12:00 a.m.

CVE-2021-32749

2021-07-1600:00:00
ubuntu.com
ubuntu.com
32

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.018 Low

EPSS

Percentile

88.2%

fail2ban is a daemon to ban hosts that cause multiple authentication
errors. In versions 0.9.7 and prior, 0.10.0 through 0.10.6, and 0.11.0
through 0.11.2, there is a vulnerability that leads to possible remote code
execution in the mailing action mail-whois. Command mail from mailutils
package used in mail actions like mail-whois can execute command if
unescaped sequences (\n~) are available in “foreign” input (for instance
in whois output). To exploit the vulnerability, an attacker would need to
insert malicious characters into the response sent by the whois server,
either via a MITM attack or by taking over a whois server. The issue is
patched in versions 0.10.7 and 0.11.3. As a workaround, one may avoid the
usage of action mail-whois or patch the vulnerability manually.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchfail2ban< 0.10.2-2ubuntu0.1~esm1UNKNOWN
ubuntu20.04noarchfail2ban< 0.11.1-1ubuntu0.1~esm1UNKNOWN
ubuntu14.04noarchfail2ban< 0.8.11-1ubuntu0.1~esm1UNKNOWN
ubuntu16.04noarchfail2ban< 0.9.3-1ubuntu0.1~esm1UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.018 Low

EPSS

Percentile

88.2%