CVE-2013-2178

The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban before 0.8.10 do not properly validate log messages, which allows remote attackers to block arbitrary IP addresses via certain messages in a request.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
VendorProductVersion
fail2banfail2ban
𝑥
≤ 0.8.9
fail2banfail2ban
0.1.0
fail2banfail2ban
0.1.1
fail2banfail2ban
0.1.2
fail2banfail2ban
0.3.0
fail2banfail2ban
0.3.1
fail2banfail2ban
0.4.0
fail2banfail2ban
0.4.1
fail2banfail2ban
0.5.0
fail2banfail2ban
0.5.1
fail2banfail2ban
0.5.2
fail2banfail2ban
0.5.3
fail2banfail2ban
0.5.4
fail2banfail2ban
0.5.5
fail2banfail2ban
0.6.0
fail2banfail2ban
0.6.1
fail2banfail2ban
0.7.0
fail2banfail2ban
0.7.1
fail2banfail2ban
0.7.2
fail2banfail2ban
0.7.3
fail2banfail2ban
0.7.4
fail2banfail2ban
0.7.5
fail2banfail2ban
0.7.6
fail2banfail2ban
0.7.7
fail2banfail2ban
0.7.8
fail2banfail2ban
0.7.9
fail2banfail2ban
0.8.0
fail2banfail2ban
0.8.1
fail2banfail2ban
0.8.2
fail2banfail2ban
0.8.3
fail2banfail2ban
0.8.4
fail2banfail2ban
0.8.5
fail2banfail2ban
0.8.6
fail2banfail2ban
0.8.7
fail2banfail2ban
0.8.7.1
fail2banfail2ban
0.8.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
fail2ban
bullseye
0.11.2-2
fixed
bookworm
1.0.2-2
fixed
sid
1.1.0-7
fixed
trixie
1.1.0-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
fail2ban
trusty
not-affected
saucy
not-affected
raring
ignored
quantal
ignored
precise
Fixed 0.8.6-3wheezy2build0.12.04.1
released
lucid
ignored