Package: otrs2
Version: 6.0.36-2
Severity: important
Tags: security upstream


Hi,

The following vulnerabilities were published for otrs2. Couldn't
find any Znuny references yet.

CVE-2021-36096[0]
Generated Support Bundles contains private S/MIME and PGP keys if 
containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) 
Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 
7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior 
versions.
https://otrs.com/release-notes/otrs-security-advisory-2021-10/

CVE-2021-36095[1]
Malicious attacker is able to find out valid user logins by using the 
"lost password" feature. This issue affects: OTRS AG ((OTRS)) Community 
Edition version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 
7.0.28 and prior versions.
https://otrs.com/release-notes/otrs-security-advisory-2021-18/

CVE-2021-36094[2]
It's possible to craft a request for appointment edit screen, which 
could lead to the XSS attack. This issue affects: OTRS AG ((OTRS)) 
Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 
7.0.x version 7.0.28 and prior versions.
https://otrs.com/release-notes/otrs-security-advisory-2021-17/

CVE-2021-36093[3]
It's possible to create an email which can be stuck while being 
processed by PostMaster filters, causing DoS. This issue affects: OTRS 
AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. 
OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 
8.0.15 and prior versions.
https://otrs.com/release-notes/otrs-security-advisory-2021-16/

[0] https://security-tracker.debian.org/tracker/CVE-2021-36096
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36096

[1] https://security-tracker.debian.org/tracker/CVE-2021-36095
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36095

[2] https://security-tracker.debian.org/tracker/CVE-2021-36094
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36094

[3] https://security-tracker.debian.org/tracker/CVE-2021-36093
        https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36093


-- System Information:
Debian Release: 10.10
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-17-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Reply via email to