config/filter.d/cyrus-imap.conf in the cyrus-imap filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.kb.cert.org/vuls/id/686662 | third party advisory us government resource |
https://github.com/fail2ban/fail2ban/commit/bd175f026737d66e7110868fb50b3760ff75e087 | patch exploit |
http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html | vendor advisory |
http://www.debian.org/security/2014/dsa-2979 | vendor advisory |