drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in request-tracker4
Name: |
Mehrere Probleme in request-tracker4 |
|
ID: |
DSA-3176-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian wheezy |
|
Datum: |
Do, 26. Februar 2015, 21:14 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9472
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1165
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1464 |
|
Applikationen: |
Request Tracker |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3176-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso February 26, 2015 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : request-tracker4 CVE ID : CVE-2014-9472 CVE-2015-1165 CVE-2015-1464
Multiple vulnerabilities have been discovered in Request Tracker, an extensible trouble-ticket tracking system. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2014-9472
Christian Loos discovered a remote denial of service vulnerability, exploitable via the email gateway and affecting any installation which accepts mail from untrusted sources. Depending on RT's logging configuration, a remote attacker can take advantage of this flaw to cause CPU and excessive disk usage.
CVE-2015-1165
Christian Loos discovered an information disclosure flaw which may reveal RSS feeds URLs, and thus ticket data.
CVE-2015-1464
It was discovered that RSS feed URLs can be leveraged to perform session hijacking, allowing a user with the URL to log in as the user that created the feed.
For the stable distribution (wheezy), these problems have been fixed in version 4.0.7-5+deb7u3.
For the unstable distribution (sid), these problems have been fixed in version 4.2.8-3.
We recommend that you upgrade your request-tracker4 packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJU71C8AAoJEAVMuPMTQ89ENQAQAJA8agv/2VdDIYAwyv+2FV7M 1Arg6FbVN5tzge0fknMJ1a5vNMIaVnHNO+MPknKOB2+o+O7Lsk6RNW21Wr0PvrmM Q1VWKBPD8tiPhj7MuEfAWvjz8py0AvZZ2LoiMa05BXTQqWbUvFDNBFE5IdYpnQFS Zsyzsg0nEqfvwqlcSElD3m9nm0DfRikTkFJ0AHS78+eY0I1J4Zcv8IP3whEu4KBy Y4HHwpmoClziszw42jpPAUd3FEUVVam/VS53WiQkDLefjyPfVUWnH8Hk4owisk/l 2PNiQ3TkCcCBjF+NAkpgHnPXJ7c2WwQto9WoOyPKVPNH2Defk8+cVkzkpG1vA978 rhdhiVSFaHQ1LcFJvqYiS9b2AMv5O3GDC73/a6/HRNeMspXQBYJ5iCBb+b4iI4PQ XtjjhaofArxH5eZ9ltEMOWtTeSDbLcCP4vrHYoHacw/1HxeJ9TP/VTm621Mm/31M O4/ltuQEYVKRzbdVmzUb5USEkkX8RTPNIYPwRmCdOMiOr+DCNd+ast3IzTmRfF4h jCDnlmsd4/VQSgaiW9cSV9MXxzJ9cZkEMDC/BwlUQt6Cn43IEsdNebjPW8Ndkj6R 0daeEtMBzG10XEd8HE3ZX4wxiSxhM3bV/dV2fcRntK9opWwhmxmxCjRoS27YDAzr xZG8zRfGJuH4oe4nTa0o =CWqr -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: https://lists.debian.org/E1YR1no-000084-Eg@master.debian.org
|
|
|
|