The OVAL Repository5.102015-09-03T11:11:16.301-04:00DoS for arbitrary chosen IP addressesopenSUSE 11.4openSUSE 12.2openSUSE 12.3The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban before 0.8.10 do not properly validate log messages, which allows remote attackers to block arbitrary IP addresses via certain messages in a request.Maria KedovskayaDRAFTINTERIMACCEPTEDJerome AthiasINTERIMACCEPTEDACCEPTEDopenSUSE 12.3 is installedopenSUSE 12.3openSUSE 12.3 is installed.Maria KedovskayaDRAFTINTERIMACCEPTEDJerome AthiasINTERIMACCEPTEDACCEPTEDopenSUSE 11.4 is installedopenSUSE 11.4openSUSE 11.4 is installed.Maria KedovskayaDRAFTINTERIMACCEPTEDJerome AthiasINTERIMACCEPTEDACCEPTEDopenconnect vulnerabilityopenSUSE 12.2Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.Maria KedovskayaDRAFTINTERIMACCEPTEDJerome AthiasINTERIMACCEPTEDACCEPTEDopenSUSE 12.2 is installedopenSUSE 12.2openSUSE 12.2 is installed.Maria KedovskayaDRAFTINTERIMACCEPTEDJerome AthiasINTERIMACCEPTEDACCEPTEDfail2banopenSUSE-releaseopenconnect-docopenconnect-debuginfoopenconnectopenconnect-debugsourceopenconnect-langopenconnect-devel12.311.4noarch0:0.8.6-2.9.1noarch0:0.8.4-22.112.2noarch0:0.8.8-2.8.1noarch0:1.6.8-2.6.1