CVE-2012-6578
Severity CVSS v4.0:
Pending analysis
Type:
CWE-310
Cryptographic Issues
Publication date:
24/07/2013
Last modified:
11/04/2025
Description
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled with a "Sign by default" queue configuration, uses a queue's key for signing, which might allow remote attackers to spoof messages by leveraging the lack of authentication semantics.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



