Link Following Affecting fail2ban package, versions <0.8.4+svn20110323-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-FAIL2BAN-522595
  • published10 Jun 2014
  • disclosed10 Jun 2014

Introduced: 10 Jun 2014

CVE-2009-5023  (opens in a new tab)
CWE-59  (opens in a new tab)

How to fix?

Upgrade Debian:11 fail2ban to version 0.8.4+svn20110323-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream fail2ban package and not the fail2ban package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

The (1) dshield.conf, (2) mail-buffered.conf, (3) mynetwatchman.conf, and (4) mynetwatchman.conf actions in action.d/ in Fail2ban before 0.8.5 allows local users to write to arbitrary files via a symlink attack on temporary files with predictable names, as demonstrated by /tmp/fail2ban-mail.txt.

CVSS Scores

version 3.1