CVE-2012-6580
24.07.2013, 12:01
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, does not ensure that the UI labels unencrypted messages as unencrypted, which might make it easier for remote attackers to spoof details of a message's origin or interfere with encryption-policy auditing via an e-mail message to a queue's address.Enginsight
| Vendor | Product | Version |
|---|---|---|
| bestpractical | request_tracker | 3.8.3 |
| bestpractical | request_tracker | 3.8.4 |
| bestpractical | request_tracker | 3.8.7 |
| bestpractical | request_tracker | 3.8.9 |
| bestpractical | request_tracker | 3.8.10 |
| bestpractical | request_tracker | 3.8.11 |
| bestpractical | request_tracker | 3.8.12 |
| bestpractical | request_tracker | 3.8.13 |
| bestpractical | request_tracker | 3.8.14 |
| bestpractical | request_tracker | 4.0.0 |
| bestpractical | request_tracker | 4.0.1 |
| bestpractical | request_tracker | 4.0.2 |
| bestpractical | request_tracker | 4.0.3 |
| bestpractical | request_tracker | 4.0.4 |
| bestpractical | request_tracker | 4.0.5 |
| bestpractical | request_tracker | 4.0.6 |
| bestpractical | request_tracker | 4.0.7 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| request-tracker3.8 |
| ||||||||||||||||||||||||
| request-tracker4 |
|
Common Weakness Enumeration