CVE-2012-6581
Published: 24 July 2013
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to bypass intended restrictions on reading keys in the product's keyring, and trigger outbound e-mail messages signed by an arbitrary stored secret key, by leveraging a UI e-mail signing privilege.
Priority
Status
Package | Release | Status |
---|---|---|
request-tracker3.8 Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Ignored
(end of life)
|
|
quantal |
Does not exist
|
|
raring |
Does not exist
|
|
saucy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(3.8.15)
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
request-tracker4 Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Not vulnerable
(4.0.13-1)
|
|
trusty |
Does not exist
(trusty was not-affected [4.0.13-1])
|
|
upstream |
Released
(4.0.8)
|
|
utopic |
Not vulnerable
(4.0.13-1)
|
|
vivid |
Not vulnerable
(4.0.13-1)
|
|
wily |
Not vulnerable
(4.0.13-1)
|
|
xenial |
Not vulnerable
(4.0.13-1)
|
|
yakkety |
Not vulnerable
(4.0.13-1)
|
|
zesty |
Not vulnerable
(4.0.13-1)
|