CVE-2007-4321

Source
https://nvd.nist.gov/vuln/detail/CVE-2007-4321
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2007-4321.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2007-4321
Published
2007-08-14T00:17:00Z
Modified
2025-04-09T00:30:58Z
Downstream
Summary
[none]
Details

fail2ban 0.8 and earlier does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a client protocol version identification containing an IP address string, a different vector than CVE-2006-6302.

References

Affected packages

Debian:11 / fail2ban

Package

Name
fail2ban
Purl
pkg:deb/debian/fail2ban?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.0-4

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / fail2ban

Package

Name
fail2ban
Purl
pkg:deb/debian/fail2ban?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.0-4

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / fail2ban

Package

Name
fail2ban
Purl
pkg:deb/debian/fail2ban?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8.0-4

Ecosystem specific

{
    "urgency": "medium"
}