Vulnerability CVE-2021-32749: Information

Description

fail2ban is a daemon to ban hosts that cause multiple authentication errors. In versions 0.9.7 and prior, 0.10.0 through 0.10.6, and 0.11.0 through 0.11.2, there is a vulnerability that leads to possible remote code execution in the mailing action mail-whois. Command `mail` from mailutils package used in mail actions like `mail-whois` can execute command if unescaped sequences (`\n~`) are available in "foreign" input (for instance in whois output). To exploit the vulnerability, an attacker would need to insert malicious characters into the response sent by the whois server, either via a MITM attack or by taking over a whois server. The issue is patched in versions 0.10.7 and 0.11.3. As a workaround, one may avoid the usage of action `mail-whois` or patch the vulnerability manually.

Severity: HIGH (8.1) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Published: July 16, 2021
Modified: Nov. 7, 2023
Error type identifier: CWE-94

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
fail2bansisyphus0.11.2-alt20.11.2-alt4ALT-PU-2021-2836-1285437Fixed
fail2banp100.11.2-alt20.11.2-alt2ALT-PU-2021-2873-1285440Fixed
fail2banc10f10.11.2-alt20.11.2-alt2ALT-PU-2021-2873-1285440Fixed
fail2banc9f20.11.2-alt20.11.2-alt2ALT-PU-2022-2862-1308330Fixed
fail2banp110.11.2-alt20.11.2-alt4ALT-PU-2021-2836-1285437Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:fail2ban:fail2ban:*:*:*:*:*:*:*:*
      Start including
      0.11.0
      End excliding
      0.11.3

      cpe:2.3:a:fail2ban:fail2ban:*:*:*:*:*:*:*:*
      Start including
      0.10.0
      End excliding
      0.10.7

      cpe:2.3:a:fail2ban:fail2ban:*:*:*:*:*:*:*:*
      End including
      0.9.7

      Configuration 2

      cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

      cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*