First published: Wed Jul 24 2013(Updated: )
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to bypass intended restrictions on reading keys in the product's keyring, and trigger outbound e-mail messages signed by an arbitrary stored secret key, by leveraging a UI e-mail signing privilege.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bestpractical Request Tracker | =3.8.3 | |
Bestpractical Request Tracker | =3.8.4 | |
Bestpractical Request Tracker | =3.8.7 | |
Bestpractical Request Tracker | =3.8.9 | |
Bestpractical Request Tracker | =3.8.10 | |
Bestpractical Request Tracker | =3.8.11 | |
Bestpractical Request Tracker | =3.8.12 | |
Bestpractical Request Tracker | =3.8.13 | |
Bestpractical Request Tracker | =3.8.14 | |
Bestpractical Request Tracker | =4.0.0 | |
Bestpractical Request Tracker | =4.0.1 | |
Bestpractical Request Tracker | =4.0.2 | |
Bestpractical Request Tracker | =4.0.3 | |
Bestpractical Request Tracker | =4.0.4 | |
Bestpractical Request Tracker | =4.0.5 | |
Bestpractical Request Tracker | =4.0.6 | |
Bestpractical Request Tracker | =4.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.