{"vuid":"VU#686662","idnumber":"686662","name":"Fail2ban postfix and cyrus-imap filters contain denial-of-service vulnerabilities","keywords":["fail2ban","postfix","cyrus-imap","filters","dos","denial","service"],"overview":"Fail2ban versions prior to 0.8.11 are susceptible to a denial-of-service attack when a maliciously crafted email address is parsed by the postfix or cyrus-imap filters. If users have not deployed either of these filters then they are not affected.","clean_desc":"Fail2ban versions prior to 0.8.11 are susceptible to a denial-of-service attack when a maliciously crafted email address is parsed by the postfix or cyrus-imap filters. An attacker can cause arbitrary IP addresses to be blocked by fail2ban. CVE-2013-7177: cyrus-imap\nhttps://github.com/fail2ban/fail2ban/commit/bd175f026737d66e7110868fb50b3760ff75e087 CVE-2013-7176: postfix\nhttps://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821","impact":"A remote unauthenticated attacker may cause arbitrary IP addresses to be blocked by Fail2ban causing legitimate users to be blocked from accessing services protected by Fail2ban.","resolution":"Apply an Update Fail2Ban 0.8.11 addresses these vulnerabilities. Users are advised to upgrade to Fail2ban 0.8.11 or later.","workarounds":"","sysaffected":"","thanks":"Thanks to Steven Hiscocks for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["http://www.fail2ban.org","https://github.com/fail2ban/fail2ban/commit/bd175f026737d66e7110868fb50b3760ff75e087","https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821"],"cveids":["CVE-2013-7176","CVE-2013-7177"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-12-02T19:35:51Z","publicdate":"2014-01-20T00:00:00Z","datefirstpublished":"2014-01-28T15:09:10Z","dateupdated":"2014-01-28T15:09:11Z","revision":14,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"N","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.8","cvss_basevector":"AV:N/AC:L/Au:N/C:N/I:N/A:C","cvss_temporalscore":"6.4","cvss_environmentalscore":"4.82658855084","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}