CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
Low
EPSS
Percentile
87.8%
config/filter.d/cyrus-imap.conf in the cyrus-imap filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
Vendor | Product | Version | CPE |
---|---|---|---|
fail2ban | fail2ban | * | cpe:2.3:a:fail2ban:fail2ban:*:*:*:*:*:*:*:* |
fail2ban | fail2ban | 0.1.0 | cpe:2.3:a:fail2ban:fail2ban:0.1.0:*:*:*:*:*:*:* |
fail2ban | fail2ban | 0.1.1 | cpe:2.3:a:fail2ban:fail2ban:0.1.1:*:*:*:*:*:*:* |
fail2ban | fail2ban | 0.1.2 | cpe:2.3:a:fail2ban:fail2ban:0.1.2:*:*:*:*:*:*:* |
fail2ban | fail2ban | 0.3.0 | cpe:2.3:a:fail2ban:fail2ban:0.3.0:*:*:*:*:*:*:* |
fail2ban | fail2ban | 0.3.1 | cpe:2.3:a:fail2ban:fail2ban:0.3.1:*:*:*:*:*:*:* |
fail2ban | fail2ban | 0.4.0 | cpe:2.3:a:fail2ban:fail2ban:0.4.0:*:*:*:*:*:*:* |
fail2ban | fail2ban | 0.4.1 | cpe:2.3:a:fail2ban:fail2ban:0.4.1:*:*:*:*:*:*:* |
fail2ban | fail2ban | 0.5.0 | cpe:2.3:a:fail2ban:fail2ban:0.5.0:*:*:*:*:*:*:* |
fail2ban | fail2ban | 0.5.1 | cpe:2.3:a:fail2ban:fail2ban:0.5.1:*:*:*:*:*:*:* |