Fail2Ban: what is apache-overflows?

Solution 1:

The /etc/fail2ban/filters.d/apache-overflows.conf file may help explain it more:

Notes.: Regexp to catch Apache overflow attempts.

The regex that is being a applied to the log can provide more detail:

failregex = [[]client []] (Invalid method in request|request failed: URI too long|erroneous characters after protocol string)

Certain types of attacks against Apache are done to try and overflow the memory buffer and cause it to crash, effectively creating a denial of service. This filter attempts to detect the attack before it completely overwhelms the web server and then will apply whatever action you specify.