CVE-2012-6578
24.07.2013, 12:01
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled with a "Sign by default" queue configuration, uses a queue's key for signing, which might allow remote attackers to spoof messages by leveraging the lack of authentication semantics.Enginsight
Vendor | Product | Version |
---|---|---|
bestpractical | request_tracker | 3.8.3 |
bestpractical | request_tracker | 3.8.4 |
bestpractical | request_tracker | 3.8.7 |
bestpractical | request_tracker | 3.8.9 |
bestpractical | request_tracker | 3.8.10 |
bestpractical | request_tracker | 3.8.11 |
bestpractical | request_tracker | 3.8.12 |
bestpractical | request_tracker | 3.8.13 |
bestpractical | request_tracker | 3.8.14 |
bestpractical | request_tracker | 4.0.0 |
bestpractical | request_tracker | 4.0.1 |
bestpractical | request_tracker | 4.0.2 |
bestpractical | request_tracker | 4.0.3 |
bestpractical | request_tracker | 4.0.4 |
bestpractical | request_tracker | 4.0.5 |
bestpractical | request_tracker | 4.0.6 |
bestpractical | request_tracker | 4.0.7 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
request-tracker3.8 |
| ||||||||||||||||||||||||
request-tracker4 |
|
Common Weakness Enumeration