config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.kb.cert.org/vuls/id/686662 | third party advisory us government resource |
http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html | vendor advisory |
http://www.debian.org/security/2014/dsa-2979 | vendor advisory |
https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821 | patch exploit |