First published: Wed Jul 24 2013(Updated: )
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, does not ensure that the UI labels unencrypted messages as unencrypted, which might make it easier for remote attackers to spoof details of a message's origin or interfere with encryption-policy auditing via an e-mail message to a queue's address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Request Tracker | =3.8.3 | |
Request Tracker | =3.8.4 | |
Request Tracker | =3.8.7 | |
Request Tracker | =3.8.9 | |
Request Tracker | =3.8.10 | |
Request Tracker | =3.8.11 | |
Request Tracker | =3.8.12 | |
Request Tracker | =3.8.13 | |
Request Tracker | =3.8.14 | |
Request Tracker | =4.0.0 | |
Request Tracker | =4.0.1 | |
Request Tracker | =4.0.2 | |
Request Tracker | =4.0.3 | |
Request Tracker | =4.0.4 | |
Request Tracker | =4.0.5 | |
Request Tracker | =4.0.6 | |
Request Tracker | =4.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6580 is classified as a medium severity vulnerability due to its potential impact on message integrity and encryption policy enforcement.
To fix CVE-2012-6580, upgrade to Best Practical Solutions Request Tracker version 3.8.15 or 4.0.8 or later.
CVE-2012-6580 affects Request Tracker versions 3.8.x before 3.8.15 and 4.0.x before 4.0.8.
The impact of CVE-2012-6580 may allow remote attackers to spoof message details or interfere with encryption policy auditing.
Yes, CVE-2012-6580 is applicable only when GnuPG is enabled in the affected versions of Request Tracker.