Summary: | <net-analyzer/fail2ban-0.8.8: input variable quoting vulnerability (CVE-2012-5642) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Mario Kicherer <dev> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | netmon |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://raw.github.com/fail2ban/fail2ban/master/ChangeLog | ||
Whiteboard: | B4 [noglsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 449966 | ||
Bug Blocks: |
Description
Mario Kicherer
2012-12-17 10:25:40 UTC
* [83109bc] IMPORTANT: escape the content of <matches> (if used in custom action files) since its value could contain arbitrary symbols. Thanks for discovery go to the NBS System security team Thanks, Mario and Jeroen. Arches, please test and mark stable =net-analyzer/fail2ban-0.8.8 x86 stable amd64 stable Stable for HPPA. ppc stable CVE-2012-5642 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5642): server/action.py in Fail2ban before 0.8.8 does not properly handle the content of the matches tag, which might allow remote attackers to trigger unsafe behavior in a custom action file via unspecified symbols in this content. ppc64 stable GLSA vote: no. Can we close this bug? I guess GLSA is not required anymore. :) NO too, closing. |