The email gateway in RT (aka Request Tracker) 3.0.0 through 4.x before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to cause a denial of service (CPU and disk consumption) via a crafted email.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.debian.org/security/2015/dsa-3176 | Third Party Advisory | 
| http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html | Vendor Advisory | 
| http://www.securityfocus.com/bid/72832 | Third Party Advisory VDB Entry | 
| http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154047.html | Third Party Advisory | 
| http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154213.html | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
Information
                Published : 2015-03-09 07:59
Updated : 2016-08-23 10:45
NVD link : CVE-2014-9472
Mitre link : CVE-2014-9472
JSON object : View
CWE
                
                    
                        
                        CWE-399
                        
            Resource Management Errors
Products Affected
                debian
- debian_linux
bestpractical
- request_tracker
fedoraproject
- fedora


