ID CVE-2012-6579
Summary Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to configure encryption or signing for certain outbound e-mail, and possibly cause a denial of service (loss of e-mail readability), via an e-mail message to a queue's address.
References
Vulnerable Configurations
  • cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*
CVSS
Base: 6.4 (as of 26-07-2013 - 04:00)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:P
refmap via4
mlist [rt-announce] 20121025 Security vulnerabilities in RT
Last major update 26-07-2013 - 04:00
Published 24-07-2013 - 12:01
Last modified 26-07-2013 - 04:00
Back to Top