{"id":"CVE-2013-7177","details":"config/filter.d/cyrus-imap.conf in the cyrus-imap filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.","modified":"2026-04-16T01:41:44.552599729Z","published":"2014-02-01T15:55:04Z","withdrawn":"2026-01-27T04:11:52.963133Z","related":["openSUSE-SU-2024:10347-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-2979"},{"type":"FIX","url":"https://github.com/fail2ban/fail2ban/commit/bd175f026737d66e7110868fb50b3760ff75e087"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/686662"}],"schema_version":"1.7.3"}