Описание
The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban before 0.8.10 do not properly validate log messages, which allows remote attackers to block arbitrary IP addresses via certain messages in a request.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.8.10-1 |
| esm-infra-legacy/trusty | not-affected | 0.8.10-1 |
| lucid | ignored | end of life |
| precise | released | 0.8.6-3wheezy2build0.12.04.1 |
| quantal | ignored | end of life |
| raring | ignored | end of life |
| saucy | not-affected | 0.8.10-1 |
| trusty | not-affected | 0.8.10-1 |
| trusty/esm | not-affected | 0.8.10-1 |
| upstream | released | 0.8.10 |
Показывать по
5 Medium
CVSS2
Связанные уязвимости
The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban before 0.8.10 do not properly validate log messages, which allows remote attackers to block arbitrary IP addresses via certain messages in a request.
The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and ap ...
The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban before 0.8.10 do not properly validate log messages, which allows remote attackers to block arbitrary IP addresses via certain messages in a request.
5 Medium
CVSS2