VYPR
Unrated severityNVD Advisory· Published Jul 24, 2013· Updated Apr 29, 2026

CVE-2012-6578

CVE-2012-6578

Description

Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled with a "Sign by default" queue configuration, uses a queue's key for signing, which might allow remote attackers to spoof messages by leveraging the lack of authentication semantics.

Affected products

17
  • cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*+ 16 more
    • cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.