First published: Wed Jul 24 2013(Updated: )
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to bypass intended restrictions on reading keys in the product's keyring, and trigger outbound e-mail messages signed by an arbitrary stored secret key, by leveraging a UI e-mail signing privilege.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Request Tracker | =3.8.3 | |
Request Tracker | =3.8.4 | |
Request Tracker | =3.8.7 | |
Request Tracker | =3.8.9 | |
Request Tracker | =3.8.10 | |
Request Tracker | =3.8.11 | |
Request Tracker | =3.8.12 | |
Request Tracker | =3.8.13 | |
Request Tracker | =3.8.14 | |
Request Tracker | =4.0.0 | |
Request Tracker | =4.0.1 | |
Request Tracker | =4.0.2 | |
Request Tracker | =4.0.3 | |
Request Tracker | =4.0.4 | |
Request Tracker | =4.0.5 | |
Request Tracker | =4.0.6 | |
Request Tracker | =4.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6581 has a medium severity rating due to its potential to allow unauthorized access to sensitive keyring data.
To fix CVE-2012-6581, upgrade to Best Practical Solutions Request Tracker version 3.8.15 or 4.0.8 or later.
CVE-2012-6581 affects Best Practical Solutions Request Tracker versions 3.8.x before 3.8.15 and 4.0.x before 4.0.8.
CVE-2012-6581 allows attackers to bypass restrictions on reading keys and send emails signed with arbitrary secret keys.
Yes, GnuPG must be enabled for CVE-2012-6581 to be exploited.