Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 482872 (CVE-2012-6578) - <www-apps/rt-{3.8.15,4.0.8} : Multiple vulnerabilities (CVE-2012-{6578,6579,6580,6581})
Summary: <www-apps/rt-{3.8.15,4.0.8} : Multiple vulnerabilities (CVE-2012-{6578,6579,6...
Status: RESOLVED FIXED
Alias: CVE-2012-6578
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-08-29 03:20 UTC by GLSAMaker/CVETool Bot
Modified: 2013-08-29 14:19 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2013-08-29 03:20:00 UTC
CVE-2012-6581 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6581):
  Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when
  GnuPG is enabled, allows remote attackers to bypass intended restrictions on
  reading keys in the product's keyring, and trigger outbound e-mail messages
  signed by an arbitrary stored secret key, by leveraging a UI e-mail signing
  privilege.

CVE-2012-6580 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6580):
  Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when
  GnuPG is enabled, does not ensure that the UI labels unencrypted messages as
  unencrypted, which might make it easier for remote attackers to spoof
  details of a message's origin or interfere with encryption-policy auditing
  via an e-mail message to a queue's address.

CVE-2012-6579 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6579):
  Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when
  GnuPG is enabled, allows remote attackers to configure encryption or signing
  for certain outbound e-mail, and possibly cause a denial of service (loss of
  e-mail readability), via an e-mail message to a queue's address.

CVE-2012-6578 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6578):
  Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when
  GnuPG is enabled with a "Sign by default" queue configuration, uses a
  queue's key for signing, which might allow remote attackers to spoof
  messages by leveraging the lack of authentication semantics.
Comment 1 Chris Reffett (RETIRED) gentoo-dev Security 2013-08-29 03:20:54 UTC
Just filed for tracking CVEs. Doesn't affect us, version bump happened in another bug. Closing.