Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title request-tracker3.8 security update
Informations
Name DSA-2567 First vendor Publication 2012-10-26
Vendor Debian Last vendor Modification 2012-10-26
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Several vulnerabilities were discovered in Request Tracker, an issue tracking system.

CVE-2012-4730 Authenticated users can add arbitrary headers or content to mail generated by RT.

CVE-2012-4732 A CSRF vulnerability may allow attackers to toggle ticket bookmarks.

CVE-2012-4734 If users follow a crafted URI and log in to RT, they may trigger actions which would ordinarily blocked by the CSRF prevention logic.

CVE-2012-4735 Several different vulnerabilities in GnuPG processing allow attackers to cause RT to improperly sign outgoing email.

CVE-2012-4884 If GnuPG support is enabled, authenticated users attackers can create arbitrary files as the web server user, which may enable arbitrary code execution.

Please note that if you run request-tracker3.8 under the Apache web server, you must stop and start Apache manually. The "restart" mechanism is not recommended, especially when using mod_perl.

For the stable distribution (squeeze), these problems have been fixed in version 3.8.8-7+squeeze6.

For the unstable distribution (sid), these problems have been fixed in version 4.0.7-2 of the request-tracker4 package.

We recommend that you upgrade your request-tracker3.8 packages.

Original Source

Url : http://www.debian.org/security/2012/dsa-2567

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-264 Permissions, Privileges, and Access Controls
25 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)
25 % CWE-94 Failure to Control Generation of Code ('Code Injection')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 70

OpenVAS Exploits

Date Description
2012-11-26 Name : FreeBSD Ports: rt40
File : nvt/freebsd_rt400.nasl
2012-11-09 Name : Fedora Update for rt3 FEDORA-2012-17174
File : nvt/gb_fedora_2012_17174_rt3_fc17.nasl
2012-11-09 Name : Fedora Update for rt3 FEDORA-2012-17218
File : nvt/gb_fedora_2012_17218_rt3_fc16.nasl
2012-10-29 Name : Debian Security Advisory DSA 2567-1 (request-tracker3.8)
File : nvt/deb_2567_1.nasl

Nessus® Vulnerability Scanner

Date Description
2012-11-27 Name : The remote web server is running a Perl application that is affected by multi...
File : rt_3_8_15_or_4_0_8.nasl - Type : ACT_GATHER_INFO
2012-11-08 Name : The remote Fedora host is missing a security update.
File : fedora_2012-17143.nasl - Type : ACT_GATHER_INFO
2012-11-08 Name : The remote Fedora host is missing a security update.
File : fedora_2012-17174.nasl - Type : ACT_GATHER_INFO
2012-11-08 Name : The remote Fedora host is missing a security update.
File : fedora_2012-17218.nasl - Type : ACT_GATHER_INFO
2012-11-02 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_4b738d54242711e29817c8600054b392.nasl - Type : ACT_GATHER_INFO
2012-10-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2567.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-02-17 11:31:26
  • Multiple Updates
2013-07-25 21:23:38
  • Multiple Updates
2012-11-13 13:21:58
  • Multiple Updates
2012-11-11 17:20:40
  • Multiple Updates