[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-5642Date: (C)2013-01-01   (M)2023-12-22


server/action.py in Fail2ban before 0.8.8 does not properly handle the content of the matches tag, which might allow remote attackers to trigger unsafe behavior in a custom action file via unspecified symbols in this content.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
MDVSA-2013:078
http://sourceforge.net/mailarchive/message.php?msg_id=30193056
http://www.openwall.com/lists/oss-security/2012/12/17/2
https://bugs.gentoo.org/show_bug.cgi?id=447572
https://bugzilla.redhat.com/show_bug.cgi?id=887914
https://github.com/fail2ban/fail2ban/commit/83109bc
https://raw.github.com/fail2ban/fail2ban/master/ChangeLog
openSUSE-SU-2013:0566
openSUSE-SU-2013:0567

CPE    34
cpe:/a:fail2ban:fail2ban:0.1.0
cpe:/a:fail2ban:fail2ban:0.7.4
cpe:/a:fail2ban:fail2ban:0.8.3
cpe:/a:fail2ban:fail2ban:0.5.5
...
OVAL    4
oval:org.secpod.oval:def:104403
oval:org.secpod.oval:def:104475
oval:org.secpod.oval:def:105473
oval:org.secpod.oval:def:105565
...

© SecPod Technologies