Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-32749
HistoryJul 16, 2021 - 12:00 a.m.

CVE-2021-32749

2021-07-1600:00:00
ubuntu.com
ubuntu.com
34
fail2ban
daemon
vulnerability
mail-whois
remote code execution
mailutils
command execution

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.018

Percentile

88.1%

fail2ban is a daemon to ban hosts that cause multiple authentication
errors. In versions 0.9.7 and prior, 0.10.0 through 0.10.6, and 0.11.0
through 0.11.2, there is a vulnerability that leads to possible remote code
execution in the mailing action mail-whois. Command mail from mailutils
package used in mail actions like mail-whois can execute command if
unescaped sequences (\n~) are available in “foreign” input (for instance
in whois output). To exploit the vulnerability, an attacker would need to
insert malicious characters into the response sent by the whois server,
either via a MITM attack or by taking over a whois server. The issue is
patched in versions 0.10.7 and 0.11.3. As a workaround, one may avoid the
usage of action mail-whois or patch the vulnerability manually.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchfail2ban< 0.10.2-2ubuntu0.1~esm1UNKNOWN
ubuntu20.04noarchfail2ban< 0.11.1-1ubuntu0.1~esm1UNKNOWN
ubuntu14.04noarchfail2ban< 0.8.11-1ubuntu0.1~esm1UNKNOWN
ubuntu16.04noarchfail2ban< 0.9.3-1ubuntu0.1~esm1UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.018

Percentile

88.1%