Summary
The target is running at least one instance of osTicket 1.2.7 or earlier. Such versions are subject to a denial of service attack in open.php if osTicket is configured to receive mails using aliases. If so, a remote attacker can generate a mail loop on the target by opening a ticket with the support address as the contact email address. For details, see :
- http://www.osticket.com/forums/showthread.php?t=301
***** OVS has determined the vulnerability exists on the target ***** simply by looking at the version number(s) of osTicket installed ***** there. It has no way of knowing which method osTicket uses to ***** retrieve mail.
Solution
Configure osTicket to receive mail using POP3.
Severity
Classification
-
CVSS Base Score: 0.0
AV:N/AC:L/Au:N/C:N/I:N/A:N
Related Vulnerabilities
- Wireshark SigComp Universal Decompressor Virtual Machine dissector DOS Vulnerability (Win)
- Apache 'mod_proxy_ftp' Module Denial Of Service Vulnerability (Linux)
- Wireshark PPP And NFS Dissector Denial of Service Vulnerabilities (Windows)
- Oracle VM VirtualBox Unspecified Denial of Service Vulnerability (Mac OS X)
- Malwarebytes-Anti-Exploit Denial Of Service (Windows)