[Bug 870406] CVE-2012-4730 CVE-2012-4732 CVE-2012-4734 CVE-2012-4735 CVE-2012-4884 rt3: Multiple flaws fixed in upstream 3.8.15 version

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=870406

Jan Lieskovsky <jlieskov@xxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
              Alias|                            |CVE-2012-6578,
                   |                            |CVE-2012-6579,
                   |                            |CVE-2012-6580,
                   |                            |CVE-2012-6581

--- Comment #3 from Jan Lieskovsky <jlieskov@xxxxxxxxxx> ---
The CVE-2012-4735 identifier has been rejected in favour of: CVE-2012-6578,
CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581:

==
Name: CVE-2012-4735

** REJECT **

DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6578,
CVE-2012-6579, CVE-2012-6580, CVE-2012-6581. Reason: This candidate
is a duplicate of CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and
CVE-2012-6581. Notes: All CVE users should reference one or more of
CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581
instead of this candidate. All references and descriptions in this
candidate have been removed to prevent accidental usage.

==

with CVE-2012-6578, CVE-2012-6579, CVE-2012-6580, and CVE-2012-6581 description
being as follows:

==

* CVE-2012-6578:
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when
GnuPG is enabled with a "Sign by default" queue configuration, uses a queue's
key for signing, which might allow remote attackers to spoof messages by 
leveraging the lack of authentication semantics.

References:
http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html
==

* CVE-2012-6579:
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when
GnuPG is enabled, allows remote attackers to configure encryption or signing
for certain outbound e-mail, and possibly cause a denial of service (loss of
e-mail readability), via an e-mail message to a queue's address.

References:
http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html
==

* CVE-2012-6580:
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when
GnuPG is enabled, does not ensure that the UI labels unencrypted messages as
unencrypted, which might make it easier for remote attackers to spoof details
of a message's origin or interfere with encryption-policy auditing via an
e-mail message to a queue's address.

References:
http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html
==

* CVE-2012-6581:
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when
GnuPG is enabled, allows remote attackers to bypass intended restrictions on
reading keys in the product's keyring, and trigger outbound e-mail messages
signed by an arbitrary stored secret key, by leveraging a UI e-mail signing
privilege.

References:
http://lists.bestpractical.com/pipermail/rt-announce/2012-October/000212.html

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=h0BltmVPUy&a=cc_unsubscribe
--
Fedora Extras Perl SIG
http://www.fedoraproject.org/wiki/Extras/SIGs/Perl
perl-devel mailing list
perl-devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/perl-devel





[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Legacy Announce]     [Fedora PHP Devel]     [Kernel Devel]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite Information]
  Powered by Linux