Synopsis
The remote Debian host is missing a security-related update.
Description
Multiple vulnerabilities have been discovered in Request Tracker, an extensible trouble-ticket tracking system. The Common Vulnerabilities and Exposures project identifies the following problems :
  - CVE-2013-3368     The rt command line tool uses semi-predictable temporary     files. A malicious user can use this flaw to overwrite     files with permissions of the user running the rt     command line tool.
  - CVE-2013-3369     A malicious user who is allowed to see administration     pages can run arbitrary Mason components (without     control of arguments), which may have negative     side-effects.
  - CVE-2013-3370     Request Tracker allows direct requests to private     callback components, which could be used to exploit a     Request Tracker extension or a local callback which uses     the arguments passed to it insecurely.
  - CVE-2013-3371     Request Tracker is vulnerable to cross-site scripting     attacks via attachment filenames.
  - CVE-2013-3372     Dominic Hargreaves discovered that Request Tracker is     vulnerable to an HTTP header injection limited to the     value of the Content-Disposition header.
  - CVE-2013-3373     Request Tracker is vulnerable to a MIME header injection     in outgoing email generated by Request Tracker.
  Request Tracker stock templates are resolved by this update. But any   custom email templates should be updated to ensure that values   interpolated into mail headers do not contain newlines.
  - CVE-2013-3374     Request Tracker is vulnerable to limited session re-use     when using the file-based session store,     Apache::Session::File. However Request Tracker's default     session configuration only uses Apache::Session::File     when configured for Oracle databases.
This version of Request Tracker includes a database content upgrade.
If you are using a dbconfig-managed database, you will be offered the choice of applying this automatically. Otherwise see the explanation in /usr/share/doc/request-tracker3.8/NEWS.Debian.gz for the manual steps to perform.
Please note that if you run request-tracker3.8 under the Apache web server, you must stop and start Apache manually. The 'restart' mechanism is not recommended, especially when using mod_perl or any form of persistent Perl process such as FastCGI or SpeedyCGI.
Solution
Upgrade the request-tracker3.8 packages.
For the oldstable distribution (squeeze), these problems have been fixed in version 3.8.8-7+squeeze7.
The stable, testing and unstable distributions do not contain anymore request-tracker3.8, which is replaced by request-tracker4.
Plugin Details
File Name: debian_DSA-2670.nasl
Agent: unix
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
Vulnerability Information
CPE: cpe:/o:debian:debian_linux:6.0, p-cpe:/a:debian:debian_linux:request-tracker3.8
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 5/22/2013