ALT-BU-2019-4087-1
Branch p9 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-16664
Code injection exists in Kernel/System/Spelling.pm in Open Ticket Request System (OTRS) 5 before 5.0.24, 4 before 4.0.26, and 3.3 before 3.3.20. In the agent interface, an authenticated remote attacker can execute shell commands as the webserver user via URL manipulation.
- [debian-lts-announce] 20171219 [SECURITY] [DLA 1212-1] otrs2 security update
- [debian-lts-announce] 20171219 [SECURITY] [DLA 1212-1] otrs2 security update
- DSA-4047
- DSA-4047
- https://www.otrs.com/security-advisory-2017-07-security-update-otrs-framework/
- https://www.otrs.com/security-advisory-2017-07-security-update-otrs-framework/
Modified: 2024-11-21
CVE-2017-16854
In Open Ticket Request System (OTRS) through 3.3.20, 4 through 4.0.26, 5 through 5.0.24, and 6 through 6.0.1, an attacker who is logged in as a customer can use the ticket search form to disclose internal article information of their customer tickets.
- [debian-lts-announce] 20171219 [SECURITY] [DLA 1212-1] otrs2 security update
- [debian-lts-announce] 20171219 [SECURITY] [DLA 1212-1] otrs2 security update
- DSA-4066
- DSA-4066
- https://www.otrs.com/security-advisory-2017-08-security-update-otrs-framework/
- https://www.otrs.com/security-advisory-2017-08-security-update-otrs-framework/
Modified: 2024-11-21
CVE-2017-16921
In OTRS 6.0.x up to and including 6.0.1, OTRS 5.0.x up to and including 5.0.24, and OTRS 4.0.x up to and including 4.0.26, an attacker who is logged into OTRS as an agent can manipulate form parameters (related to PGP) and execute arbitrary shell commands with the permissions of the OTRS or web server user.
- http://packetstormsecurity.com/files/162295/OTRS-6.0.1-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/162295/OTRS-6.0.1-Remote-Command-Execution.html
- [debian-lts-announce] 20171219 [SECURITY] [DLA 1212-1] otrs2 security update
- [debian-lts-announce] 20171219 [SECURITY] [DLA 1212-1] otrs2 security update
- DSA-4066
- DSA-4066
- 43853
- 43853
- https://www.otrs.com/security-advisory-2017-09-security-update-otrs-framework/
- https://www.otrs.com/security-advisory-2017-09-security-update-otrs-framework/
Modified: 2024-11-21
CVE-2017-17476
Open Ticket Request System (OTRS) 4.0.x before 4.0.28, 5.0.x before 5.0.26, and 6.0.x before 6.0.3, when cookie support is disabled, might allow remote attackers to hijack web sessions and consequently gain privileges via a crafted email.
- https://github.com/OTRS/otrs/commit/26707eaaa791648e6c7ad6aeaa27efd70e7c66eb
- https://github.com/OTRS/otrs/commit/26707eaaa791648e6c7ad6aeaa27efd70e7c66eb
- https://github.com/OTRS/otrs/commit/36e3be99cfe8a9e09afa1b75fdc39f3e28f561fc
- https://github.com/OTRS/otrs/commit/36e3be99cfe8a9e09afa1b75fdc39f3e28f561fc
- https://github.com/OTRS/otrs/commit/720c73fbf53e476ca7dfdf2ae1d4d3d2aad2b953
- https://github.com/OTRS/otrs/commit/720c73fbf53e476ca7dfdf2ae1d4d3d2aad2b953
- [debian-lts-announce] 20171220 [SECURITY] [DLA 1215-1] otrs2 security update
- [debian-lts-announce] 20171220 [SECURITY] [DLA 1215-1] otrs2 security update
- DSA-4069
- DSA-4069
- https://www.otrs.com/security-advisory-2017-10-security-update-otrs-framework/
- https://www.otrs.com/security-advisory-2017-10-security-update-otrs-framework/
Modified: 2024-11-21
CVE-2018-7567
In the Admin Package Manager in Open Ticket Request System (OTRS) 5.0.0 through 5.0.24 and 6.0.0 through 6.0.1, authenticated admins are able to exploit a Blind Remote Code Execution vulnerability by loading a crafted opm file with an embedded CodeInstall element to execute a command on the server during package installation. NOTE: the vendor disputes this issue stating "the behaviour is as designed and needed for different packages to be installed", "there is a security warning if the package is not verified by OTRS Group", and "there is the possibility and responsibility of an admin to check packages before installation which is possible as they are not binary.
Modified: 2024-11-21
CVE-2019-10067
An issue was discovered in Open Ticket Request System (OTRS) 7.x through 7.0.6 and Community Edition 5.0.x through 5.0.35 and 6.0.x through 6.0.17. An attacker who is logged into OTRS as an agent user with appropriate permissions may manipulate the URL to cause execution of JavaScript in the context of OTRS.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://community.otrs.com/security-advisory-2019-05-security-update-for-otrs-framework/
- https://community.otrs.com/security-advisory-2019-05-security-update-for-otrs-framework/
Modified: 2024-11-21
CVE-2019-12248
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.7, Community Edition 6.0.x through 6.0.19, and Community Edition 5.0.x through 5.0.36. An attacker could send a malicious email to an OTRS system. If a logged-in agent user quotes it, the email could cause the browser to load external image resources.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://lists.debian.org/debian-lts-announce/2019/06/msg00004.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00004.html
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://www.otrs.com/category/release-and-security-notes-en/
- https://www.otrs.com/category/release-and-security-notes-en/
Modified: 2024-11-21
CVE-2019-12497
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.8, Community Edition 6.0.x through 6.0.19, and Community Edition 5.0.x through 5.0.36. In the customer or external frontend, personal information of agents (e.g., Name and mail address) can be disclosed in external notes.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://community.otrs.com/category/security-advisories-en/
- https://community.otrs.com/category/security-advisories-en/
- https://lists.debian.org/debian-lts-announce/2019/06/msg00004.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00004.html
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
Modified: 2024-11-21
CVE-2019-12746
An issue was discovered in Open Ticket Request System (OTRS) Community Edition 5.0.x through 5.0.36 and 6.0.x through 6.0.19. A user logged into OTRS as an agent might unknowingly disclose their session ID by sharing the link of an embedded ticket article with third parties. This identifier can be then be potentially abused in order to impersonate the agent user.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://community.otrs.com/security-advisory-2019-10-security-update-for-otrs-framework/
- https://community.otrs.com/security-advisory-2019-10-security-update-for-otrs-framework/
- https://lists.debian.org/debian-lts-announce/2019/08/msg00018.html
- https://lists.debian.org/debian-lts-announce/2019/08/msg00018.html
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://www.otrs.com/category/release-and-security-notes-en/
- https://www.otrs.com/category/release-and-security-notes-en/
Modified: 2024-11-21
CVE-2019-13458
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.8, and Community Edition 5.0.x through 5.0.36 and 6.0.x through 6.0.19. An attacker who is logged into OTRS as an agent user with appropriate permissions can leverage OTRS notification tags in templates in order to disclose hashed user passwords.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://community.otrs.com/security-advisory-2019-12-security-update-for-otrs-framework/
- https://community.otrs.com/security-advisory-2019-12-security-update-for-otrs-framework/
- https://lists.debian.org/debian-lts-announce/2019/08/msg00018.html
- https://lists.debian.org/debian-lts-announce/2019/08/msg00018.html
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://www.otrs.com/category/release-and-security-notes-en/
- https://www.otrs.com/category/release-and-security-notes-en/
Modified: 2024-11-21
CVE-2019-16375
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.11, and Community Edition 5.0.x through 5.0.37 and 6.0.x through 6.0.22. An attacker who is logged in as an agent or customer user with appropriate permissions can create a carefully crafted string containing malicious JavaScript code as an article body. This malicious code is executed when an agent composes an answer to the original article.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://community.otrs.com/category/security-advisories-en/
- https://community.otrs.com/category/security-advisories-en/
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://otrs.com/release-notes/otrs-security-advisory-2019-13/
- https://otrs.com/release-notes/otrs-security-advisory-2019-13/
Modified: 2024-11-21
CVE-2019-9752
An issue was discovered in Open Ticket Request System (OTRS) 5.x before 5.0.34, 6.x before 6.0.16, and 7.x before 7.0.4. An attacker who is logged into OTRS as an agent or a customer user may upload a carefully crafted resource in order to cause execution of JavaScript in the context of OTRS. This is related to Content-type mishandling in Kernel/Modules/PictureUpload.pm.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- https://community.otrs.com/security-advisory-2019-01-security-update-for-otrs-framework
- [debian-lts-announce] 20190319 [SECURITY] [DLA 1721-1] otrs2 security update
- openSUSE-SU-2020:0551
- [debian-lts-announce] 20190319 [SECURITY] [DLA 1721-1] otrs2 security update
- https://community.otrs.com/security-advisory-2019-01-security-update-for-otrs-framework
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1475
Modified: 2024-11-21
CVE-2019-9892
An issue was discovered in Open Ticket Request System (OTRS) 5.x through 5.0.34, 6.x through 6.0.17, and 7.x through 7.0.6. An attacker who is logged into OTRS as an agent user with appropriate permissions may try to import carefully crafted Report Statistics XML that will result in reading of arbitrary files on the OTRS filesystem.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- https://community.otrs.com/security-advisory-2019-04-security-update-for-otrs-framework/
- https://lists.debian.org/debian-lts-announce/2019/05/msg00003.html
- openSUSE-SU-2020:0551
- https://lists.debian.org/debian-lts-announce/2019/05/msg00003.html
- https://community.otrs.com/security-advisory-2019-04-security-update-for-otrs-framework/
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1475
Closed bugs
Просьба обновить
Closed vulnerabilities
BDU:2019-04891
Уязвимость DNS-сервера BIND, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01437
Уязвимость DNS-сервер BIND, связанная с одновременном выполнением с использованием общего ресурса с неправильной синхронизацией, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-6471
A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -> 9.11.7-S1.
Modified: 2024-11-21
CVE-2019-6477
With pipelining enabled each incoming query on a TCP connection requires a similar resource allocation to a query received via UDP or via TCP without pipelining enabled. A client using a TCP-pipelined connection to a server could consume more resources than the server has been provisioned to handle. When a TCP connection with a large number of pipelined queries is closed, the load on the server releasing these multiple resources can cause it to become unresponsive, even for queries that can be answered authoritatively or from cache. (This is most likely to be perceived as an intermittent server problem).
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1701
- https://kb.isc.org/docs/cve-2019-6477
- FEDORA-2019-c703d2304a
- FEDORA-2019-73a8737068
- https://support.f5.com/csp/article/K15840535?utm_source=f5support&%3Butm_medium=RSS
- DSA-4689
- https://www.synology.com/security/advisory/Synology_SA_19_39
- openSUSE-SU-2020:1699
- https://www.synology.com/security/advisory/Synology_SA_19_39
- DSA-4689
- https://support.f5.com/csp/article/K15840535?utm_source=f5support&%3Butm_medium=RSS
- FEDORA-2019-73a8737068
- FEDORA-2019-c703d2304a
- https://kb.isc.org/docs/cve-2019-6477
- openSUSE-SU-2020:1701
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-14823
A flaw was found in the "Leaf and Chain" OCSP policy implementation in JSS' CryptoManager versions after 4.4.6, 4.5.3, 4.6.0, where it implicitly trusted the root certificate of a certificate chain. Applications using this policy may not properly verify the chain and could be vulnerable to attacks such as Man in the Middle.
- RHSA-2019:3067
- RHSA-2019:3067
- RHSA-2019:3225
- RHSA-2019:3225
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14823
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14823
- FEDORA-2019-24a0a2f24e
- FEDORA-2019-24a0a2f24e
- FEDORA-2019-68c2fbcf82
- FEDORA-2019-68c2fbcf82
- FEDORA-2019-4d33c62860
- FEDORA-2019-4d33c62860
Package 389-ds-base updated to version 1.4.1.10-alt1 for branch p9 in task 240823.
Closed vulnerabilities
BDU:2022-05827
Уязвимость плагина deref сервера службы каталогов 389 Directory Server, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2019-10224
A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When executed in verbose mode, the dscreate and dsconf commands may display sensitive information, such as the Directory Manager password. An attacker, able to see the screen or record the terminal standard error output, could use this flaw to gain sensitive information.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10224
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10224
- [debian-lts-announce] 20230424 [SECURITY] [DLA 3399-1] 389-ds-base security update
- [debian-lts-announce] 20230424 [SECURITY] [DLA 3399-1] 389-ds-base security update
- https://pagure.io/389-ds-base/issue/50251
- https://pagure.io/389-ds-base/issue/50251
Modified: 2024-11-21
CVE-2019-14824
A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes.
- RHSA-2019:3981
- RHSA-2019:3981
- RHSA-2020:0464
- RHSA-2020:0464
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14824
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14824
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2004-1] 389-ds-base security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2004-1] 389-ds-base security update
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
Modified: 2024-11-21
CVE-2019-3883
In 389-ds-base up to version 1.4.1.2, requests are handled by workers threads. Each sockets will be waited by the worker for at most 'ioblocktimeout' seconds. However this timeout applies only for un-encrypted requests. Connections using SSL/TLS are not taking this timeout into account during reads, and may hang longer.An unauthenticated attacker could repeatedly create hanging LDAP requests to hang all the workers, resulting in a Denial of Service.
- RHSA-2019:1896
- RHSA-2019:1896
- RHSA-2019:3401
- RHSA-2019:3401
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3883
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3883
- [debian-lts-announce] 20190506 [SECURITY] [DLA 1779-1] 389-ds-base security update
- [debian-lts-announce] 20190506 [SECURITY] [DLA 1779-1] 389-ds-base security update
- [debian-lts-announce] 20230424 [SECURITY] [DLA 3399-1] 389-ds-base security update
- [debian-lts-announce] 20230424 [SECURITY] [DLA 3399-1] 389-ds-base security update
- https://pagure.io/389-ds-base/issue/50329
- https://pagure.io/389-ds-base/issue/50329
- https://pagure.io/389-ds-base/pull-request/50331
- https://pagure.io/389-ds-base/pull-request/50331