Bug 861504 (CVE-2013-7177) - VUL-0: CVE-2013-7177: fail2ban: remote denial of service in cyrus-imap filter
Summary: VUL-0: CVE-2013-7177: fail2ban: remote denial of service in cyrus-imap filter
Status: RESOLVED FIXED
: CVE-2013-7176 (view as bug list)
Alias: CVE-2013-7177
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other openSUSE 13.1
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Johannes Weberhofer
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-01-31 10:53 UTC by Alexander Bergmann
Modified: 2014-04-08 19:04 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Swamp Workflow Management 2014-01-31 23:00:55 UTC
bugbot adjusting priority
Comment 2 Johannes Weberhofer 2014-02-04 10:31:52 UTC
In version 0.8.11 the changelog says: "In light of CVE-2013-2178 that triggered our last release we have put a  significant effort into tightening all of the regexs of our filters to avoid  another similar vulnerability. We haven't examined all of these for a potential  DoS scenario however it is possible that another DoS vulnerability exists that  is fixed by this release. A large number of filters have been updated to  include more failure regexs supporting previously unbanned failures and support  newer application versions too. We have test cases for most of these now  however if you have other examples that demonstrate that a filter is  insufficient we welcome your feedback. During the tightening of the regexs to  avoid DoS vulnerabilities there is the possibility that we have inadvertently,  despite our best intentions, incorrectly allowed a failure to continue."

As the last updates possibly influences more jails then noted in the CVEs, I vote to upgrade to version 0.8.11 or even better 0.8.12 which is already available in "security:fail2ban".
Comment 3 Johannes Weberhofer 2014-02-04 10:37:16 UTC
*** Bug 861503 has been marked as a duplicate of this bug. ***
Comment 4 Marcus Meissner 2014-02-04 10:40:26 UTC
a version upgrade should be possible, feel free to submit that.

(the config files will not change, right?)

but please mention this bug in the .changes file to track the decision.
Comment 5 Johannes Weberhofer 2014-02-04 11:02:22 UTC
It's more or less a change in the configs and in the software:

for many services there is a regex defined in configuration files to detect break-in-attemts;

the issues itself occured in those regexes. Therefore all the configs where checked, adapted and improved and test cases have been added. As long as the users didn't chnage single configs, a rpm update will solve the problems.
Comment 6 Marcus Meissner 2014-02-25 12:12:12 UTC
then just submit and we see how it turns out :)
Comment 7 Bernhard Wiedemann 2014-02-25 13:00:16 UTC
This is an autogenerated message for OBS integration:
This bug (861504) was mentioned in
https://build.opensuse.org/request/show/223812 13.1 / fail2ban
Comment 8 Bernhard Wiedemann 2014-02-25 14:00:12 UTC
This is an autogenerated message for OBS integration:
This bug (861504) was mentioned in
https://build.opensuse.org/request/show/223812 13.1 / fail2ban
Comment 9 Bernhard Wiedemann 2014-02-25 15:00:18 UTC
This is an autogenerated message for OBS integration:
This bug (861504) was mentioned in
https://build.opensuse.org/request/show/223823 12.3 / fail2ban
Comment 10 Swamp Workflow Management 2014-03-08 19:04:47 UTC
openSUSE-SU-2014:0348-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 824710,861503,861504
CVE References: CVE-2013-2178,CVE-2013-7176,CVE-2013-7177
Sources used:
openSUSE 13.1 (src):    fail2ban-0.8.12-2.5.1
openSUSE 12.3 (src):    fail2ban-0.8.12-2.12.1
Comment 11 Marcus Meissner 2014-03-08 21:02:14 UTC
released
Comment 12 Swamp Workflow Management 2014-04-08 19:04:45 UTC
openSUSE-SU-2014:0493-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 824710,861503,861504
CVE References: CVE-2013-2178,CVE-2013-7176,CVE-2013-7177
Sources used:
openSUSE 11.4 (src):    fail2ban-0.8.12-26.1