Vulnerability Details : CVE-2012-6579
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to configure encryption or signing for certain outbound e-mail, and possibly cause a denial of service (loss of e-mail readability), via an e-mail message to a queue's address.
Vulnerability category: Denial of service
Products affected by CVE-2012-6579
- cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-6579
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-6579
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:P |
10.0
|
4.9
|
NIST |
CWE ids for CVE-2012-6579
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-6579
-
http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html
[rt-announce] Security vulnerabilities in RTPatch;Vendor Advisory
Jump to