6.4
CVSSv2

CVE-2012-6579

Published: 24/07/2013 Updated: 26/07/2013
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

Best Practical Solutions RT 3.8.x prior to 3.8.15 and 4.0.x prior to 4.0.8, when GnuPG is enabled, allows remote malicious users to configure encryption or signing for certain outbound e-mail, and possibly cause a denial of service (loss of e-mail readability), via an e-mail message to a queue's address.

Vulnerable Product Search on Vulmon Subscribe to Product

bestpractical request tracker 3.8.9

bestpractical request tracker 3.8.10

bestpractical request tracker 3.8.11

bestpractical request tracker 3.8.12

bestpractical request tracker 3.8.13

bestpractical request tracker 3.8.3

bestpractical request tracker 3.8.7

bestpractical request tracker 3.8.4

bestpractical request tracker 3.8.14

bestpractical request tracker 4.0.0

bestpractical request tracker 4.0.7

bestpractical request tracker 4.0.3

bestpractical request tracker 4.0.2

bestpractical request tracker 4.0.5

bestpractical request tracker 4.0.4

bestpractical request tracker 4.0.1

bestpractical request tracker 4.0.6

Vendor Advisories

Several vulnerabilities were discovered in Request Tracker (RT), an issue tracking system CVE-2012-4730 Authenticated users can add arbitrary headers or content to mail generated by RT CVE-2012-4732 A CSRF vulnerability may allow attackers to toggle ticket bookmarks CVE-2012-4734 If users follow a crafted URI and log in to RT, they may t ...