#VU43223 Input validation error in Fail2ban - CVE-2012-5642
Published: December 31, 2012 / Updated: August 11, 2020
Fail2ban
Fail2ban
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
server/action.py in Fail2ban before 0.8.8 does not properly handle the content of the matches tag, which might allow remote attackers to trigger unsafe behavior in a custom action file via unspecified symbols in this content.
Remediation
External links
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00002.html
- http://sourceforge.net/mailarchive/message.php?msg_id=30193056
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:078
- http://www.openwall.com/lists/oss-security/2012/12/17/2
- https://bugs.gentoo.org/show_bug.cgi?id=447572
- https://bugzilla.redhat.com/show_bug.cgi?id=887914
- https://github.com/fail2ban/fail2ban/commit/83109bc
- https://raw.github.com/fail2ban/fail2ban/master/ChangeLog