Описание
fail2ban 0.8 and earlier does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a client protocol version identification containing an IP address string, a different vector than CVE-2006-6302.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | released | 0.8.0-4 |
edgy | ignored | end of life, was needed |
feisty | ignored | end of life, was needed |
gutsy | released | 0.8.0-4 |
hardy | released | 0.8.0-4 |
intrepid | released | 0.8.0-4 |
jaunty | released | 0.8.0-4 |
karmic | released | 0.8.0-4 |
upstream | needs-triage |
Показывать по
Ссылки на источники
6.8 Medium
CVSS2
Связанные уязвимости
fail2ban 0.8 and earlier does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a client protocol version identification containing an IP address string, a different vector than CVE-2006-6302.
fail2ban 0.8 and earlier does not properly parse sshd log files, which ...
fail2ban 0.8 and earlier does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a client protocol version identification containing an IP address string, a different vector than CVE-2006-6302.
6.8 Medium
CVSS2