ID CVE-2014-9472
Summary The email gateway in RT (aka Request Tracker) 3.0.0 through 4.x before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to cause a denial of service (CPU and disk consumption) via a crafted email.
References
Vulnerable Configurations
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.6.10:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.6.10:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.6.11:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.6.11:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.15:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.15:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.16:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.16:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.17:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.17:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.20:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.20:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.21:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.21:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.22:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.22:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.2.9:*:*:*:*:*:*:*
CVSS
Base: 7.1 (as of 23-08-2016 - 17:45)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:C
refmap via4
bid 72832
confirm http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html
debian DSA-3176
fedora
  • FEDORA-2015-4666
  • FEDORA-2015-4698
Last major update 23-08-2016 - 17:45
Published 09-03-2015 - 14:59
Last modified 23-08-2016 - 17:45
Back to Top