VYPR
Unrated severityNVD Advisory· Published Mar 9, 2015· Updated May 6, 2026

CVE-2014-9472

CVE-2014-9472

Description

The email gateway in RT (aka Request Tracker) 3.0.0 through 4.x before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to cause a denial of service (CPU and disk consumption) via a crafted email.

Affected products

51
  • cpe:2.3:a:bestpractical:request_tracker:3.6.10:*:*:*:*:*:*:*+ 47 more
    • cpe:2.3:a:bestpractical:request_tracker:3.6.10:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.6.11:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.6.8:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.15:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.16:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.17:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.10:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.11:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.12:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.13:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.14:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.15:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.16:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.17:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.18:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.19:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.20:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.21:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.22:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.8:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.9:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.9:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
    • cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.