First published: Sun Mar 17 2019(Updated: )
The email-ingestion feature in Best Practical Request Tracker 4.1.13 through 4.4 allows denial of service by remote attackers via an algorithmic complexity attack on email address parsing.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libemail-address-list-perl | 0.06-1 0.06-2 | |
ubuntu/libemail-address-list-perl | <0.05-1+ | 0.05-1+ |
ubuntu/libemail-address-list-perl | <0.06-1 | 0.06-1 |
ubuntu/libemail-address-list-perl | <0.06-1 | 0.06-1 |
ubuntu/libemail-address-list-perl | <0.06-1 | 0.06-1 |
ubuntu/libemail-address-list-perl | <0.06-1 | 0.06-1 |
ubuntu/libemail-address-list-perl | <0.05-1+ | 0.05-1+ |
Bestpractical Request Tracker | >=4.1.13<=4.4.0 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18898 is a vulnerability in the email-ingestion feature of Best Practical Request Tracker, versions 4.1.13 through 4.4, that allows denial of service attacks.
CVE-2018-18898 is considered a high severity vulnerability with a severity value of 7.5.
To fix CVE-2018-18898, you should update to a version of Best Practical Request Tracker that is not affected by the vulnerability.
You can find more information about CVE-2018-18898 on the Best Practical website and the Fedora Project mailing list.
The Common Weakness Enumeration (CWE) associated with CVE-2018-18898 is CWE-400.