Vulnerability Details : CVE-2013-2178
The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban before 0.8.10 do not properly validate log messages, which allows remote attackers to block arbitrary IP addresses via certain messages in a request.
Vulnerability category: Input validation
Products affected by CVE-2013-2178
- cpe:2.3:a:fail2ban:fail2ban:*:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.7.9:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.8.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:fail2ban:fail2ban:0.8.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-2178
1.66%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-2178
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2013-2178
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2178
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17338
Repository / Oval Repository
-
http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html
openSUSE-SU-2014:0348-1: moderate: fail2ban: security and bugfix upgrade
-
http://www.debian.org/security/2013/dsa-2708
Debian -- Security Information -- DSA-2708-1 fail2ban
-
https://raw.github.com/fail2ban/fail2ban/master/ChangeLog
-
http://www.openwall.com/lists/oss-security/2013/06/13/7
oss-security - Re: Re: Fail2ban 0.8.9, Denial of Service (Apache rules only)
-
https://vndh.net/note:fail2ban-089-denial-service
Jump to