CVE-2012-6578

Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled with a "Sign by default" queue configuration, uses a queue's key for signing, which might allow remote attackers to spoof messages by leveraging the lack of authentication semantics.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 49%
VendorProductVersion
bestpracticalrequest_tracker
3.8.3
bestpracticalrequest_tracker
3.8.4
bestpracticalrequest_tracker
3.8.7
bestpracticalrequest_tracker
3.8.9
bestpracticalrequest_tracker
3.8.10
bestpracticalrequest_tracker
3.8.11
bestpracticalrequest_tracker
3.8.12
bestpracticalrequest_tracker
3.8.13
bestpracticalrequest_tracker
3.8.14
bestpracticalrequest_tracker
4.0.0
bestpracticalrequest_tracker
4.0.1
bestpracticalrequest_tracker
4.0.2
bestpracticalrequest_tracker
4.0.3
bestpracticalrequest_tracker
4.0.4
bestpracticalrequest_tracker
4.0.5
bestpracticalrequest_tracker
4.0.6
bestpracticalrequest_tracker
4.0.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
request-tracker4
bullseye (security)
4.4.4+dfsg-2+deb11u3
fixed
bullseye
4.4.4+dfsg-2+deb11u3
fixed
bookworm
4.4.6+dfsg-1.1+deb12u1
fixed
bookworm (security)
4.4.6+dfsg-1.1+deb12u1
fixed
sid
4.4.7+dfsg-3
fixed
trixie
4.4.7+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
request-tracker3.8
zesty
dne
yakkety
dne
xenial
dne
wily
dne
vivid
dne
utopic
dne
trusty
dne
saucy
dne
raring
dne
quantal
dne
precise
ignored
lucid
ignored
request-tracker4
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
not-affected
vivid
not-affected
utopic
not-affected
trusty
dne
saucy
not-affected
raring
ignored
quantal
ignored
precise
ignored
lucid
dne
Common Weakness Enumeration