CVE-2012-5642

EUVD-2012-5526
server/action.py in Fail2ban before 0.8.8 does not properly handle the content of the matches tag, which might allow remote attackers to trigger unsafe behavior in a custom action file via unspecified symbols in this content.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
Affected Products (NVD)
VendorProductVersion
fail2banfail2ban
𝑥
≤ 0.8.7.1
fail2banfail2ban
0.1.0
fail2banfail2ban
0.1.1
fail2banfail2ban
0.1.2
fail2banfail2ban
0.3.0
fail2banfail2ban
0.3.1
fail2banfail2ban
0.4.0
fail2banfail2ban
0.4.1
fail2banfail2ban
0.5.0
fail2banfail2ban
0.5.1
fail2banfail2ban
0.5.2
fail2banfail2ban
0.5.3
fail2banfail2ban
0.5.4
fail2banfail2ban
0.5.5
fail2banfail2ban
0.6.0
fail2banfail2ban
0.6.1
fail2banfail2ban
0.7.0
fail2banfail2ban
0.7.1
fail2banfail2ban
0.7.2
fail2banfail2ban
0.7.3
fail2banfail2ban
0.7.4
fail2banfail2ban
0.7.5
fail2banfail2ban
0.7.6
fail2banfail2ban
0.7.7
fail2banfail2ban
0.7.8
fail2banfail2ban
0.7.9
fail2banfail2ban
0.8.0
fail2banfail2ban
0.8.1
fail2banfail2ban
0.8.2
fail2banfail2ban
0.8.3
fail2banfail2ban
0.8.4
fail2banfail2ban
0.8.5
fail2banfail2ban
0.8.6
fail2banfail2ban
0.8.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
fail2ban
bookworm
1.0.2-2
fixed
bullseye
0.11.2-2
fixed
sid
1.1.0-7
fixed
squeeze
not-affected
trixie
1.1.0-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
fail2ban
hardy
ignored
lucid
ignored
oneiric
ignored
precise
Fixed 0.8.6-3wheezy2build0.12.04.1
released
quantal
ignored
raring
ignored
saucy
not-affected
trusty
not-affected