First published: Wed Jul 24 2013(Updated: )
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to configure encryption or signing for certain outbound e-mail, and possibly cause a denial of service (loss of e-mail readability), via an e-mail message to a queue's address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Request Tracker | =3.8.3 | |
Request Tracker | =3.8.4 | |
Request Tracker | =3.8.7 | |
Request Tracker | =3.8.9 | |
Request Tracker | =3.8.10 | |
Request Tracker | =3.8.11 | |
Request Tracker | =3.8.12 | |
Request Tracker | =3.8.13 | |
Request Tracker | =3.8.14 | |
Request Tracker | =4.0.0 | |
Request Tracker | =4.0.1 | |
Request Tracker | =4.0.2 | |
Request Tracker | =4.0.3 | |
Request Tracker | =4.0.4 | |
Request Tracker | =4.0.5 | |
Request Tracker | =4.0.6 | |
Request Tracker | =4.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6579 has a moderate severity rating, as it allows remote attackers to potentially disrupt email readability.
To fix CVE-2012-6579, upgrade your Best Practical Solutions RT to version 3.8.15 or 4.0.8 or later.
CVE-2012-6579 affects Best Practical Request Tracker versions 3.8.x before 3.8.15 and 4.0.x before 4.0.8.
CVE-2012-6579 can lead to denial of service by causing a loss of email readability due to incorrect encryption or signing configurations.
Yes, CVE-2012-6579 involves GnuPG being enabled, which is crucial for the vulnerability to be exploited.