Package: fail2ban Version: 0.7.5-2 Severity: grave Tags: security Hi, CVE-2007-4321[0]:
fail2ban 0.8 and earlier does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a client protocol version identification containing an IP address string, a different vector than CVE-2006-6302. If you fix this issue, please include the CVE id in the changelog entry. You can find a patch for this problem on: http://www.ossec.net/en/attacking-loganalysis.html#patches Kind regards Nico [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4321 -- Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpCvJcktml58.pgp
Description: PGP signature