Vulnerability Details CVE-2006-6302
fail2ban 0.7.4 and earlier does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a login name containing certain strings with an IP address.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.012
EPSS Ranking 77.8%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2006-6302
-
cpe:2.3:a:fail2ban:fail2ban:-
-
cpe:2.3:a:fail2ban:fail2ban:0.1.0
-
cpe:2.3:a:fail2ban:fail2ban:0.1.1
-
cpe:2.3:a:fail2ban:fail2ban:0.1.2
-
cpe:2.3:a:fail2ban:fail2ban:0.3.0
-
cpe:2.3:a:fail2ban:fail2ban:0.3.1
-
cpe:2.3:a:fail2ban:fail2ban:0.4.0
-
cpe:2.3:a:fail2ban:fail2ban:0.4.1
-
cpe:2.3:a:fail2ban:fail2ban:0.5.0
-
cpe:2.3:a:fail2ban:fail2ban:0.5.1
-
cpe:2.3:a:fail2ban:fail2ban:0.5.2
-
cpe:2.3:a:fail2ban:fail2ban:0.5.3
-
cpe:2.3:a:fail2ban:fail2ban:0.5.4
-
cpe:2.3:a:fail2ban:fail2ban:0.5.5
-
cpe:2.3:a:fail2ban:fail2ban:0.6.0
-
cpe:2.3:a:fail2ban:fail2ban:0.6.1
-
cpe:2.3:a:fail2ban:fail2ban:0.7.0
-
cpe:2.3:a:fail2ban:fail2ban:0.7.1
-
cpe:2.3:a:fail2ban:fail2ban:0.7.2
-
cpe:2.3:a:fail2ban:fail2ban:0.7.3
-
cpe:2.3:a:fail2ban:fail2ban:0.7.4