-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2012.1031
                    request-tracker3.8 security update
                              29 October 2012

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           request-tracker3.8
Publisher:         Debian
Operating System:  Debian GNU/Linux 6
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account            
                   Modify Arbitrary Files          -- Existing Account            
                   Cross-site Request Forgery      -- Remote with User Interaction
                   Provide Misleading Information  -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2012-4884 CVE-2012-4735 CVE-2012-4734
                   CVE-2012-4732 CVE-2012-4730 

Original Bulletin: 
   http://www.debian.org/security/2012/dsa-2567

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running request-tracker3.8 check for an updated version of the 
         software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2567-1                   security@debian.org
http://www.debian.org/security/                            Florian Weimer
October 26, 2012                       http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : request-tracker3.8
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735
                 CVE-2012-4884

Several vulnerabilities were discovered in Request Tracker, an issue
tracking system.

CVE-2012-4730
	Authenticated users can add arbitrary headers or content to
	mail generated by RT.	

CVE-2012-4732
	A CSRF vulnerability may allow attackers to toggle ticket
	bookmarks.

CVE-2012-4734
	If users follow a crafted URI and log in to RT, they may
	trigger actions which would ordinarily blocked by the CSRF
	prevention logic.

CVE-2012-4735
	Several different vulnerabilities in GnuPG processing allow
	attackers to cause RT to improperly sign outgoing email.

CVE-2012-4884
	If GnuPG support is enabled, authenticated users attackers can
	create arbitrary files as the web server user, which may
	enable arbitrary code execution.

Please note that if you run request-tracker3.8 under the Apache web
server, you must stop and start Apache manually.  The "restart"
mechanism is not recommended, especially when using mod_perl.

For the stable distribution (squeeze), these problems have been fixed
in version 3.8.8-7+squeeze6.

For the unstable distribution (sid), these problems have been fixed in
version 4.0.7-2 of the request-tracker4 package.

We recommend that you upgrade your request-tracker3.8 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJQiu0pAAoJEL97/wQC1SS+6U0IAIgNEuMf+KkFN23+HBzHVjjm
otnju+yfwGTq/esl9wSxpXtromWyl2hN9t8r0spgvp+fPsRdZQOko2gOzrAIyjqI
DFHkwc2IGSnyw6qIn459mR5jTBGAB3mKxgr+FE/Vs57D+IlJ7oFDeISAEnp5JiLt
Zg4glDcjtJfBzTs8r+v6hr9S31yBvhEC+NoJhF6sKSrZ/FBq6Da/mNIwUOt72oLf
BGoCsVlGt/DZOzlaaMRk21DIkIhSu68yn+uxD3nNBMKoGWUrNtyz/HuK2616ZG8j
PZVpcNAsAiV62pVtpwBUUr7onnYIESyCcLeomTj6iPxxdALD6jQYhJ0YKicwzY0=
=W2Fm
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUI3ku+4yVqjM2NGpAQKnAA//eebVVPVuT/kCBiZVC8WmAfS00zDlRehu
0tsBb+dqvETHiuBLLtdTUo+nWoGNdOYz1Js4hPSBWmu9QYSTrOKzvHICB1sucuvT
QJQXQ6YNKDGpdJf1E589dmJNO3ymvHeJZ2olibSsEDKeQoiYQ5qE7dMPiGxt3+Ts
lsk4rgrVxEEJVIds8aguaNoJdA+/leaSiPwi3cbf5Uv9VTU6n8kw7B3uxhRtffTJ
rGvG6yrQZg/a9pf2wPQOH+EDrqMfYol54wm79P1kJBN8Au0CSd9pH0U1dE6VpMjy
bItL9FI4zsQkQyY7GWLw/YSt5XX/FGVgl+yYpp7KnofY2s4C2Tla7ie/ziT3HrNw
vol8Fg498wU9qBeJ+Zx8CbPAj8FORPiXJzvqpTmKvFfIz0p9OMv7ofTbhhs/yZ05
q19A3ZWwnr2zzASTMe7CNcLv6g4LY+rzewtfNYMv7lCmhqGol22VAmOodyn4NZ2Y
Kk0ppPgB9PZy0OCIS07Zdz8OYVWQg3lj4/RrnuLJV5SepAeJSPMGMwcUpRbE04I3
cRFaGWJaE9a2Hye46SrvbY+Fx3Yp6nVH6h6OLGq3ttFVa5sv2D2Qw7phI/rVRA0o
L9DwAkQx+pYqlc5HB+2PTdCASG7guaYYrTxEJ+uHZ31iiKFxDxdShusr0U9hwqvM
kF9QZDenWX0=
=iMQI
-----END PGP SIGNATURE-----