Package: fail2ban
Version: 0.7.5-2
Severity: grave
Tags: security

Hi,
CVE-2007-4321[0]:

fail2ban 0.8 and earlier does not properly parse sshd log 
files, which allows remote attackers to add arbitrary hosts 
to the /etc/hosts.deny file and cause a denial of service by 
adding arbitrary IP addresses to the sshd log file, as 
demonstrated by logging in via ssh with a client protocol 
version identification containing an IP address string, a 
different vector than CVE-2006-6302.

If you fix this issue, please include the CVE id in the 
changelog entry.

You can find a patch for this problem on:
http://www.ossec.net/en/attacking-loganalysis.html#patches

Kind regards
Nico
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4321

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpMd6OCccTTW.pgp
Description: PGP signature

Reply via email to