ID CVE-2012-6580
Summary Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, does not ensure that the UI labels unencrypted messages as unencrypted, which might make it easier for remote attackers to spoof details of a message's origin or interfere with encryption-policy auditing via an e-mail message to a queue's address.
References
Vulnerable Configurations
  • cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 24-07-2013 - 12:01)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
refmap via4
mlist [rt-announce] 20121025 Security vulnerabilities in RT
Last major update 24-07-2013 - 12:01
Published 24-07-2013 - 12:01
Last modified 24-07-2013 - 12:01
Back to Top