Vulnerability Description
The (1) dshield.conf, (2) mail-buffered.conf, (3) mynetwatchman.conf, and (4) mynetwatchman.conf actions in action.d/ in Fail2ban before 0.8.5 allows local users to write to arbitrary files via a symlink attack on temporary files with predictable names, as demonstrated by /tmp/fail2ban-mail.txt.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fail2Ban | Fail2Ban | <= 0.8.4 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/58841
- http://security.gentoo.org/glsa/glsa-201406-03.xml
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=544232
- https://github.com/fail2ban/fail2ban/blob/sdist/0.8.5/ChangeLog
- http://secunia.com/advisories/58841
- http://security.gentoo.org/glsa/glsa-201406-03.xml
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=544232
- https://github.com/fail2ban/fail2ban/blob/sdist/0.8.5/ChangeLog
FAQ
What is CVE-2009-5023?
CVE-2009-5023 is a vulnerability with a CVSS score of 4.7 (MEDIUM). The (1) dshield.conf, (2) mail-buffered.conf, (3) mynetwatchman.conf, and (4) mynetwatchman.conf actions in action.d/ in Fail2ban before 0.8.5 allows local users to write to arbitrary files via a syml...
How severe is CVE-2009-5023?
CVE-2009-5023 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-5023?
Check the references section above for vendor advisories and patch information. Affected products include: Fail2Ban Fail2Ban.