Summary: | CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED UPSTREAM | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | perl-devel, rc040203, tremble, xavier |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | rt3 3.8.15 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:59:31 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Bug Depends On: | 870407, 870408 | ||
Bug Blocks: |
Description
Jan Lieskovsky
2012-10-26 12:06:51 UTC
Created rt3 tracking bugs for this issue Affects: fedora-all [bug 870407] Affects: epel-all [bug 870408] Regarding the RT v3.6 based version in Fedora EPEL 5. From [2]: "Patches for all releases of 3.8.x and 4.0.x are available for download below. As RT 3.6.x has reached end of life, we will not be releasing patches for it; please contact sales at bestpractical.com if you need assistance with RT versions older than 3.8.0." The CVE-2012-4735 identifier has been rejected in favour of: CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581: == Name: CVE-2012-4735 ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, CVE-2012-6581. Reason: This candidate is a duplicate of CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581. Notes: All CVE users should reference one or more of CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. == with CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581 description being as follows: == * CVE-2012-6578: Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled with a "Sign by default" queue configuration, uses a queue's key for signing, which might allow remote attackers to spoof messages by leveraging the lack of authentication semantics. References: http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html == * CVE-2012-6579: Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to configure encryption or signing for certain outbound e-mail, and possibly cause a denial of service (loss of e-mail readability), via an e-mail message to a queue's address. References: http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html == * CVE-2012-6580: Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, does not ensure that the UI labels unencrypted messages as unencrypted, which might make it easier for remote attackers to spoof details of a message's origin or interfere with encryption-policy auditing via an e-mail message to a queue's address. References: http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html == * CVE-2012-6581: Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled, allows remote attackers to bypass intended restrictions on reading keys in the product's keyring, and trigger outbound e-mail messages signed by an arbitrary stored secret key, by leveraging a UI e-mail signing privilege. References: http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products. |