CVE-2011-4458
04.06.2012, 19:55
Best Practical Solutions RT 3.6.x, 3.7.x, and 3.8.x before 3.8.12 and 4.x before 4.0.6, when the VERPPrefix and VERPDomain options are enabled, allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-5092 and CVE-2011-5093.
Vendor | Product | Version |
---|---|---|
bestpractical | rt | 3.6.0 |
bestpractical | rt | 3.6.0:pre0 |
bestpractical | rt | 3.6.0:pre1 |
bestpractical | rt | 3.6.0:rc1 |
bestpractical | rt | 3.6.0:rc2 |
bestpractical | rt | 3.6.0:rc3 |
bestpractical | rt | 3.6.1 |
bestpractical | rt | 3.6.1:pre2 |
bestpractical | rt | 3.6.1:rc1 |
bestpractical | rt | 3.6.1:rc2 |
bestpractical | rt | 3.6.2 |
bestpractical | rt | 3.6.2:rc1 |
bestpractical | rt | 3.6.2:rc3 |
bestpractical | rt | 3.6.2:rc4 |
bestpractical | rt | 3.6.2:rc5 |
bestpractical | rt | 3.6.3 |
bestpractical | rt | 3.6.3:rc1 |
bestpractical | rt | 3.6.3:rc2 |
bestpractical | rt | 3.6.3:rc3 |
bestpractical | rt | 3.6.3:rc4 |
bestpractical | rt | 3.6.4 |
bestpractical | rt | 3.6.4:rc1 |
bestpractical | rt | 3.6.4:rc2 |
bestpractical | rt | 3.6.5 |
bestpractical | rt | 3.6.5:rc1 |
bestpractical | rt | 3.6.5:rc2 |
bestpractical | rt | 3.6.6 |
bestpractical | rt | 3.6.6:rc1 |
bestpractical | rt | 3.6.6:rc2 |
bestpractical | rt | 3.6.6:rc3 |
bestpractical | rt | 3.6.7 |
bestpractical | rt | 3.6.8 |
bestpractical | rt | 3.6.9 |
bestpractical | rt | 3.6.10 |
bestpractical | rt | 3.7.1 |
bestpractical | rt | 3.7.5 |
bestpractical | rt | 3.7.80 |
bestpractical | rt | 3.7.85 |
bestpractical | rt | 3.7.86 |
bestpractical | rt | 3.8.0 |
bestpractical | rt | 3.8.0:rc1 |
bestpractical | rt | 3.8.0:rc2 |
bestpractical | rt | 3.8.0:rc3 |
bestpractical | rt | 3.8.1 |
bestpractical | rt | 3.8.1:rc1 |
bestpractical | rt | 3.8.1:rc2 |
bestpractical | rt | 3.8.1:rc3 |
bestpractical | rt | 3.8.1:rc4 |
bestpractical | rt | 3.8.1:rc5 |
bestpractical | rt | 3.8.2 |
bestpractical | rt | 3.8.2:rc1 |
bestpractical | rt | 3.8.2:rc2 |
bestpractical | rt | 3.8.3 |
bestpractical | rt | 3.8.3:rc1 |
bestpractical | rt | 3.8.3:rc2 |
bestpractical | rt | 3.8.4 |
bestpractical | rt | 3.8.4:rc1 |
bestpractical | rt | 3.8.5 |
bestpractical | rt | 3.8.6 |
bestpractical | rt | 3.8.6:rc1 |
bestpractical | rt | 3.8.7 |
bestpractical | rt | 3.8.7:rc1 |
bestpractical | rt | 3.8.8 |
bestpractical | rt | 3.8.8:rc2 |
bestpractical | rt | 3.8.8:rc3 |
bestpractical | rt | 3.8.8:rc4 |
bestpractical | rt | 3.8.9 |
bestpractical | rt | 3.8.9:rc1 |
bestpractical | rt | 3.8.9:rc2 |
bestpractical | rt | 3.8.9:rc3 |
bestpractical | rt | 3.8.10 |
bestpractical | rt | 3.8.11 |
bestpractical | rt | 4.0.0 |
bestpractical | rt | 4.0.0:rc1 |
bestpractical | rt | 4.0.0:rc2 |
bestpractical | rt | 4.0.0:rc3 |
bestpractical | rt | 4.0.0:rc4 |
bestpractical | rt | 4.0.0:rc5 |
bestpractical | rt | 4.0.0:rc6 |
bestpractical | rt | 4.0.0:rc7 |
bestpractical | rt | 4.0.0:rc8 |
bestpractical | rt | 4.0.1 |
bestpractical | rt | 4.0.2 |
bestpractical | rt | 4.0.3 |
bestpractical | rt | 4.0.4 |
bestpractical | rt | 4.0.5 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
request-tracker3.6 |
| ||||||||||||||||||||||||||||||
request-tracker3.8 |
| ||||||||||||||||||||||||||||||
request-tracker4 |
| ||||||||||||||||||||||||||||||
rt |
|
References