Lucene search

K
cve[email protected]CVE-2012-6581
HistoryOct 03, 2022 - 4:15 p.m.

CVE-2012-6581

2022-10-0316:15:29
CWE-264
web.nvd.nist.gov
21
cve-2012-6581
best practical solutions
rt 3.8.x
rt 4.0.x
gnupg
keyring
email signing
vulnerability

6.4 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

48.0%

Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to bypass intended restrictions on reading keys in the product’s keyring, and trigger outbound e-mail messages signed by an arbitrary stored secret key, by leveraging a UI e-mail signing privilege.

Affected configurations

NVD
Node
bestpracticalrequest_trackerMatch3.8.3
OR
bestpracticalrequest_trackerMatch3.8.4
OR
bestpracticalrequest_trackerMatch3.8.7
OR
bestpracticalrequest_trackerMatch3.8.9
OR
bestpracticalrequest_trackerMatch3.8.10
OR
bestpracticalrequest_trackerMatch3.8.11
OR
bestpracticalrequest_trackerMatch3.8.12
OR
bestpracticalrequest_trackerMatch3.8.13
OR
bestpracticalrequest_trackerMatch3.8.14
Node
bestpracticalrequest_trackerMatch4.0.0
OR
bestpracticalrequest_trackerMatch4.0.1
OR
bestpracticalrequest_trackerMatch4.0.2
OR
bestpracticalrequest_trackerMatch4.0.3
OR
bestpracticalrequest_trackerMatch4.0.4
OR
bestpracticalrequest_trackerMatch4.0.5
OR
bestpracticalrequest_trackerMatch4.0.6
OR
bestpracticalrequest_trackerMatch4.0.7

6.4 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

48.0%