Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2012-6578
HistoryJul 24, 2013 - 12:01 p.m.

CVE-2012-6578

2013-07-2412:01:45
Debian Security Bug Tracker
security-tracker.debian.org
9
best practical solutions
queue configuration
remote attackers

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

49.2%

Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled with a “Sign by default” queue configuration, uses a queue’s key for signing, which might allow remote attackers to spoof messages by leveraging the lack of authentication semantics.

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

49.2%

Related for DEBIANCVE:CVE-2012-6578