ALT-PU-2014-1699-1
Closed vulnerabilities
Published: 2014-02-01
Modified: 2025-04-11
Modified: 2025-04-11
CVE-2013-7176
config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
References:
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html
- http://www.debian.org/security/2014/dsa-2979
- http://www.kb.cert.org/vuls/id/686662
- https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html
- http://www.debian.org/security/2014/dsa-2979
- http://www.kb.cert.org/vuls/id/686662
- https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821
Published: 2014-02-01
Modified: 2025-04-11
Modified: 2025-04-11
CVE-2013-7177
config/filter.d/cyrus-imap.conf in the cyrus-imap filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
References:
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html
- http://www.debian.org/security/2014/dsa-2979
- http://www.kb.cert.org/vuls/id/686662
- https://github.com/fail2ban/fail2ban/commit/bd175f026737d66e7110868fb50b3760ff75e087
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html
- http://www.debian.org/security/2014/dsa-2979
- http://www.kb.cert.org/vuls/id/686662
- https://github.com/fail2ban/fail2ban/commit/bd175f026737d66e7110868fb50b3760ff75e087