Lucene search

K
freebsdFreeBSDD08F6002-C588-11E4-8495-6805CA0B3D42
HistoryFeb 26, 2015 - 12:00 a.m.

rt -- Remote DoS, Information disclosure and Session Hijackingvulnerabilities

2015-02-2600:00:00
vuxml.freebsd.org
18

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.014 Low

EPSS

Percentile

86.4%

Best Practical reports:

RT 3.0.0 and above, if running on Perl 5.14.0 or higher,
are vulnerable to a remote denial-of-service via the email
gateway; any installation which accepts mail from untrusted
sources is vulnerable, regardless of the permissions
configuration inside RT. This denial-of-service may
encompass both CPU and disk usage, depending on RT’s logging
configuration. This vulnerability is assigned
CVE-2014-9472.
RT 3.8.8 and above are vulnerable to an information
disclosure attack which may reveal RSS feeds URLs, and thus
ticket data; this vulnerability is assigned
CVE-2015-1165. RSS feed URLs can also be leveraged to
perform session hijacking, allowing a user with the URL to
log in as the user that created the feed; this vulnerability
is assigned CVE-2015-1464.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchrt42= 4.2.0UNKNOWN
FreeBSDanynoarchrt42< 4.2.10UNKNOWN
FreeBSDanynoarchrt40= 4.0.0UNKNOWN
FreeBSDanynoarchrt40< 4.0.23UNKNOWN

7.1 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.014 Low

EPSS

Percentile

86.4%