config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-0021-1 fail2ban security update
Debian DSA Debian DSA DSA-2979-1 fail2ban security update
EUVD EUVD EUVD-2013-6959 config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-06T18:01:20.161Z

Reserved: 2013-12-19T00:00:00

Link: CVE-2013-7176

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-02-01T15:55:04.120

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-7176

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses