CVE-2012-6580
24.07.2013, 12:01
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, does not ensure that the UI labels unencrypted messages as unencrypted, which might make it easier for remote attackers to spoof details of a message's origin or interfere with encryption-policy auditing via an e-mail message to a queue's address.Enginsight
Vendor | Product | Version |
---|---|---|
bestpractical | request_tracker | 3.8.3 |
bestpractical | request_tracker | 3.8.4 |
bestpractical | request_tracker | 3.8.7 |
bestpractical | request_tracker | 3.8.9 |
bestpractical | request_tracker | 3.8.10 |
bestpractical | request_tracker | 3.8.11 |
bestpractical | request_tracker | 3.8.12 |
bestpractical | request_tracker | 3.8.13 |
bestpractical | request_tracker | 3.8.14 |
bestpractical | request_tracker | 4.0.0 |
bestpractical | request_tracker | 4.0.1 |
bestpractical | request_tracker | 4.0.2 |
bestpractical | request_tracker | 4.0.3 |
bestpractical | request_tracker | 4.0.4 |
bestpractical | request_tracker | 4.0.5 |
bestpractical | request_tracker | 4.0.6 |
bestpractical | request_tracker | 4.0.7 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
request-tracker3.8 |
| ||||||||||||||||||||||||
request-tracker4 |
|
Common Weakness Enumeration