CRLF injection vulnerability in Request Tracker (RT) 3.8.x before 3.8.17 and 4.0.x before 4.0.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a MIME header.
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "request-tracker4", "binary_version": "4.0.19-1" }, { "binary_name": "rt4-apache2", "binary_version": "4.0.19-1" }, { "binary_name": "rt4-clients", "binary_version": "4.0.19-1" }, { "binary_name": "rt4-db-mysql", "binary_version": "4.0.19-1" }, { "binary_name": "rt4-db-postgresql", "binary_version": "4.0.19-1" }, { "binary_name": "rt4-db-sqlite", "binary_version": "4.0.19-1" }, { "binary_name": "rt4-doc-html", "binary_version": "4.0.19-1" }, { "binary_name": "rt4-fcgi", "binary_version": "4.0.19-1" } ] }