{"id":"CVE-2007-4321","details":"fail2ban 0.8 and earlier does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a client protocol version identification containing an IP address string, a different vector than CVE-2006-6302.","modified":"2026-01-27T04:08:05.412417Z","published":"2007-08-14T00:17:00Z","withdrawn":"2026-01-27T04:08:05.412417Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/23237"},{"type":"ADVISORY","url":"http://secunia.com/advisories/28374"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200707-13.xml"},{"type":"ADVISORY","url":"http://www.debian.org/security/2008/dsa-1456"},{"type":"WEB","url":"http://bugs.gentoo.org/show_bug.cgi?id=181214"},{"type":"WEB","url":"http://osvdb.org/42484"},{"type":"WEB","url":"http://www.ossec.net/en/attacking-loganalysis.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/25117"}],"schema_version":"1.7.3"}