Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-7176

Опубликовано: 01 фев. 2014
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:fail2ban:fail2ban:*:*:*:*:*:*:*:*
Версия до 0.8.10 (включая)
cpe:2.3:a:fail2ban:fail2ban:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.5.5:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.4:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.5:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.6:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.7:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.8:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.7.9:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.7.1:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.8:*:*:*:*:*:*:*
cpe:2.3:a:fail2ban:fail2ban:0.8.9:*:*:*:*:*:*:*

EPSS

Процентиль: 74%
0.00843
Низкий

5 Medium

CVSS2

Дефекты

CWE-20

Связанные уязвимости

ubuntu
около 12 лет назад

config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.

debian
около 12 лет назад

config/filter.d/postfix.conf in the postfix filter in Fail2ban before ...

github
больше 3 лет назад

config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.

EPSS

Процентиль: 74%
0.00843
Низкий

5 Medium

CVSS2

Дефекты

CWE-20