CVE-2014-9472
09.03.2015, 14:59
The email gateway in RT (aka Request Tracker) 3.0.0 through 4.x before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to cause a denial of service (CPU and disk consumption) via a crafted email.Enginsight
| Vendor | Product | Version |
|---|---|---|
| debian | debian_linux | 7.0 |
| bestpractical | request_tracker | 3.6.8 |
| bestpractical | request_tracker | 3.6.10 |
| bestpractical | request_tracker | 3.6.11 |
| bestpractical | request_tracker | 3.8.3 |
| bestpractical | request_tracker | 3.8.4 |
| bestpractical | request_tracker | 3.8.7 |
| bestpractical | request_tracker | 3.8.9 |
| bestpractical | request_tracker | 3.8.10 |
| bestpractical | request_tracker | 3.8.11 |
| bestpractical | request_tracker | 3.8.12 |
| bestpractical | request_tracker | 3.8.13 |
| bestpractical | request_tracker | 3.8.14 |
| bestpractical | request_tracker | 3.8.15 |
| bestpractical | request_tracker | 3.8.16 |
| bestpractical | request_tracker | 3.8.17 |
| bestpractical | request_tracker | 4.0.0 |
| bestpractical | request_tracker | 4.0.1 |
| bestpractical | request_tracker | 4.0.2 |
| bestpractical | request_tracker | 4.0.3 |
| bestpractical | request_tracker | 4.0.4 |
| bestpractical | request_tracker | 4.0.5 |
| bestpractical | request_tracker | 4.0.6 |
| bestpractical | request_tracker | 4.0.7 |
| bestpractical | request_tracker | 4.0.8 |
| bestpractical | request_tracker | 4.0.9 |
| bestpractical | request_tracker | 4.0.10 |
| bestpractical | request_tracker | 4.0.11 |
| bestpractical | request_tracker | 4.0.12 |
| bestpractical | request_tracker | 4.0.13 |
| bestpractical | request_tracker | 4.0.14 |
| bestpractical | request_tracker | 4.0.15 |
| bestpractical | request_tracker | 4.0.16 |
| bestpractical | request_tracker | 4.0.17 |
| bestpractical | request_tracker | 4.0.18 |
| bestpractical | request_tracker | 4.0.19 |
| bestpractical | request_tracker | 4.0.20 |
| bestpractical | request_tracker | 4.0.21 |
| bestpractical | request_tracker | 4.0.22 |
| bestpractical | request_tracker | 4.2.0 |
| bestpractical | request_tracker | 4.2.1 |
| bestpractical | request_tracker | 4.2.2 |
| bestpractical | request_tracker | 4.2.3 |
| bestpractical | request_tracker | 4.2.4 |
| bestpractical | request_tracker | 4.2.5 |
| bestpractical | request_tracker | 4.2.6 |
| bestpractical | request_tracker | 4.2.7 |
| bestpractical | request_tracker | 4.2.8 |
| bestpractical | request_tracker | 4.2.9 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| request-tracker3.8 |
| ||||||||||||||||||||||||||
| request-tracker4 |
|
Common Weakness Enumeration
References