DenyHosts 2.6 does not properly parse sshd log files, which allows remote attackers to add arbitrary hosts to the /etc/hosts.deny file and cause a denial of service by adding arbitrary IP addresses to the sshd log file, as demonstrated by logging in via ssh with a client protocol version identification containing an IP address string, a different vector than CVE-2006-6301.
https://exchange.xforce.ibmcloud.com/vulnerabilities/37199
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=244943
http://www.securityfocus.com/bid/26061
http://www.ossec.net/en/attacking-loganalysis.html
http://security.gentoo.org/glsa/glsa-200710-14.xml