The email gateway in RT (aka Request Tracker) 3.0.0 through 4.x before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to cause a denial of service (CPU and disk consumption) via a crafted email.
References
Link | Resource |
---|---|
http://www.debian.org/security/2015/dsa-3176 | Third Party Advisory |
http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html | Vendor Advisory |
http://www.securityfocus.com/bid/72832 | Third Party Advisory VDB Entry |
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154047.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154213.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2015-03-09 07:59
Updated : 2016-08-23 10:45
NVD link : CVE-2014-9472
Mitre link : CVE-2014-9472
JSON object : View
CWE
CWE-399
Resource Management Errors
Products Affected
debian
- debian_linux
bestpractical
- request_tracker
fedoraproject
- fedora