Fedora 18 : fail2ban-0.8.8-1.fc18 (2012-20589)

This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.

Synopsis :

The remote Fedora host is missing a security update.

Description :

Update to 0.8.8 (CVE-2012-5642 Bug #887914)

- Fixes :

- Alan Jenkins

- [8c38907] Removed 'POSSIBLE BREAK-IN ATTEMPT' from
sshd filter to avoid banning due to misconfigured DNS.
Close gh-64

- Yaroslav Halchenko

- [83109bc] IMPORTANT: escape the content of <matches>
(if used in custom action files) since its value could
contain arbitrary symbols. Thanks for discovery go to
the NBS System security team

- [b159eab] do not enable pyinotify backend if pyinotify <

- [37a2e59] store IP as a base, non-unicode str to avoid
spurious messages in the console. Close gh-91

- New features :

- David Engeset

- [2d672d1,6288ec2] 'unbanip' command for the client +
avoidance of touching the log file to take 'banip' or
'unbanip' in effect. Close gh-81, gh-86

- Yaroslav Halchenko

- Enhancements :

- [2d66f31] replaced uninformative 'Invalid command'
message with warning log exception why command
actually failed

- [958a1b0] improved failregex to 'support' auth.backend =

- [9e7a3b7] until we make it proper module -- adjusted
sys.path only if system-wide run

- [f52ba99] downgraded 'already banned' from WARN to INFO
level. Closes gh-79

- [f105379] added hints into the log on some failure
return codes (e.g. 0x7f00 for this gh-87)

- Various others: travis-ci integration, script to run
tests against all available Python versions, etc

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :


Solution :

Update the affected fail2ban package.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false

Family: Fedora Local Security Checks

Nessus Plugin ID: 63496 ()

Bugtraq ID: 56963

CVE ID: CVE-2012-5642

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now