Vulnerability Details : CVE-2012-6580
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, does not ensure that the UI labels unencrypted messages as unencrypted, which might make it easier for remote attackers to spoof details of a message's origin or interfere with encryption-policy auditing via an e-mail message to a queue's address.
Products affected by CVE-2012-6580
- cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-6580
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 49 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-6580
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2012-6580
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-6580
-
http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html
[rt-announce] Security vulnerabilities in RTPatch;Vendor Advisory
Jump to