Debian DSA-2567-1 : request-tracker3.8 - several vulnerabilities

medium Nessus Plugin ID 62722

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities were discovered in Request Tracker (RT), an issue tracking system.

- CVE-2012-4730 Authenticated users can add arbitrary headers or content to mail generated by RT.

- CVE-2012-4732 A CSRF vulnerability may allow attackers to toggle ticket bookmarks.

- CVE-2012-4734 If users follow a crafted URI and log in to RT, they may trigger actions which would ordinarily blocked by the CSRF prevention logic.

- CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, CVE-2012-6581

Several different vulnerabilities in GnuPG processing allow attackers to cause RT to improperly sign outgoing email.

- CVE-2012-4884 If GnuPG support is enabled, authenticated users can create arbitrary files as the web server user, which may enable arbitrary code execution.

Please note that if you run request-tracker3.8 under the Apache web server, you must stop and start Apache manually. The 'restart' mechanism is not recommended, especially when using mod_perl.

Solution

Upgrade the request-tracker3.8 packages.

For the stable distribution (squeeze), these problems have been fixed in version 3.8.8-7+squeeze6.

See Also

https://security-tracker.debian.org/tracker/CVE-2012-4730

https://security-tracker.debian.org/tracker/CVE-2012-4732

https://security-tracker.debian.org/tracker/CVE-2012-4734

https://security-tracker.debian.org/tracker/CVE-2012-6578

https://security-tracker.debian.org/tracker/CVE-2012-6579

https://security-tracker.debian.org/tracker/CVE-2012-6580

https://security-tracker.debian.org/tracker/CVE-2012-6581

https://security-tracker.debian.org/tracker/CVE-2012-4884

https://packages.debian.org/source/squeeze/request-tracker3.8

https://www.debian.org/security/2012/dsa-2567

Plugin Details

Severity: Medium

ID: 62722

File Name: debian_DSA-2567.nasl

Version: 1.14

Type: local

Agent: unix

Published: 10/29/2012

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:request-tracker3.8, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 10/26/2012

Reference Information

CVE: CVE-2012-4730, CVE-2012-4732, CVE-2012-4734, CVE-2012-4884, CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, CVE-2012-6581

BID: 56290

DSA: 2567