FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

rt42 -- denial-of-service attack via the email gateway

Affected packages
4.2 <= rt42 < 4.2.1_3
4.2.2 <= rt42 < 4.2.2_2
p5-Email-Address-List < 0.02

Details

VuXML ID d1dfc4c7-8791-11e3-a371-6805ca0b3d42
Discovery 2014-01-27
Entry 2014-01-27

The RT development team reports:

Versions of RT between 4.2.0 and 4.2.2 (inclusive) are vulnerable to a denial-of-service attack via the email gateway; any installation which accepts mail from untrusted sources is vulnerable, regardless of the permissions configuration inside RT. This vulnerability is assigned CVE-2014-1474.

This vulnerability is caused by poor parsing performance in the Email::Address::List module, which RT depends on. We recommend that affected users upgrade their version of Email::Address::List to v0.02 or above, which resolves the issue. Due to a communications mishap, the release on CPAN will temporarily appear as "unauthorized," and the command-line cpan client will hence not install it. We expect this to be resolved shortly; in the meantime, the release is also available from our server.

References

CVE Name CVE-2014-1474
URL http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html