{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-18180","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-09-16T19:24:26.216Z","dateReserved":"2019-10-17T00:00:00.000Z","datePublished":"2019-12-05T14:54:55.931Z"},"containers":{"cna":{"title":"Denial of service","datePublic":"2019-11-15T00:00:00.000Z","providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-08-31T02:06:29.257Z"},"descriptions":[{"lang":"en","value":"Improper Check for filenames with overly long extensions in PostMaster (sending in email) or uploading files (e.g. attaching files to mails) of ((OTRS)) Community Edition and OTRS allows an remote attacker to cause an endless loop. This issue affects: OTRS AG: ((OTRS)) Community Edition 5.0.x version 5.0.38 and prior versions; 6.0.x version 6.0.23 and prior versions. OTRS AG: OTRS 7.0.x version 7.0.12 and prior versions."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://community.otrs.com/security-advisory-2019-15-security-update-for-otrs-framework/"},{"name":"openSUSE-SU-2020:0551","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html"},{"name":"openSUSE-SU-2020:1475","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html"},{"name":"openSUSE-SU-2020:1509","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html"},{"name":"[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","baseScore":5.3,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"OSA-2019-15","discovery":"USER"},"solutions":[{"lang":"en","value":"Upgrade to OTRS 7.0.13 or OTRS 6.0.24 or OTRS 5.0.39"},{"lang":"en","value":"Patch for  ((OTRS)) Community Edition 6.0: https://github.com/OTRS/otrs/commit/799616eb43f7fb53cae4e04c81e2156baaf02e2b \nPatch for  ((OTRS)) Community Edition 5.0: https://github.com/OTRS/otrs/commit/76b301f4e3f45cb23bb6a3d6907028c733d11145"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T01:47:13.809Z"},"title":"CVE Program Container","references":[{"url":"https://community.otrs.com/security-advisory-2019-15-security-update-for-otrs-framework/","tags":["x_transferred"]},{"name":"openSUSE-SU-2020:0551","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html"},{"name":"openSUSE-SU-2020:1475","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html"},{"name":"openSUSE-SU-2020:1509","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html"},{"name":"[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html"}]}]}}