Vulnerability Details CVE-2012-6579
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to configure encryption or signing for certain outbound e-mail, and possibly cause a denial of service (loss of e-mail readability), via an e-mail message to a queue's address.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 48.0%
CVSS Severity
CVSS v2 Score 6.4
Products affected by CVE-2012-6579
-
cpe:2.3:a:bestpractical:request_tracker:3.8.10
-
cpe:2.3:a:bestpractical:request_tracker:3.8.11
-
cpe:2.3:a:bestpractical:request_tracker:3.8.12
-
cpe:2.3:a:bestpractical:request_tracker:3.8.13
-
cpe:2.3:a:bestpractical:request_tracker:3.8.14
-
cpe:2.3:a:bestpractical:request_tracker:3.8.3
-
cpe:2.3:a:bestpractical:request_tracker:3.8.4
-
cpe:2.3:a:bestpractical:request_tracker:3.8.7
-
cpe:2.3:a:bestpractical:request_tracker:3.8.9
-
cpe:2.3:a:bestpractical:request_tracker:4.0.0
-
cpe:2.3:a:bestpractical:request_tracker:4.0.1
-
cpe:2.3:a:bestpractical:request_tracker:4.0.2
-
cpe:2.3:a:bestpractical:request_tracker:4.0.3
-
cpe:2.3:a:bestpractical:request_tracker:4.0.4
-
cpe:2.3:a:bestpractical:request_tracker:4.0.5
-
cpe:2.3:a:bestpractical:request_tracker:4.0.6
-
cpe:2.3:a:bestpractical:request_tracker:4.0.7