First published: Wed Apr 23 2014(Updated: )
Symantec PGP Desktop 10.0.x through 10.2.x and Encryption Desktop Professional 10.3.x before 10.3.2 MP1 do not properly perform memory copies, which allows remote attackers to cause a denial of service (read access violation and application crash) via a malformed certificate.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Encryption Desktop | =10.3.0 | |
Symantec Encryption Desktop | =10.3.1 | |
Symantec Encryption Desktop | =10.3.2 | |
PGP Desktop | =10.0.0 | |
PGP Desktop | =10.0.1 | |
PGP Desktop | =10.0.2 | |
PGP Desktop | =10.0.3 | |
PGP Desktop | =10.1.0 | |
PGP Desktop | =10.1.1 | |
PGP Desktop | =10.1.2 | |
PGP Desktop | =10.2.0 | |
PGP Desktop | =10.2.1 | |
PGP Desktop | =10.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1646 is rated as a denial-of-service vulnerability that can cause application crashes.
To address CVE-2014-1646, update Symantec PGP Desktop or Encryption Desktop Professional to the latest version or apply the appropriate patches.
CVE-2014-1646 affects Symantec PGP Desktop versions 10.0.x through 10.2.x and Encryption Desktop Professional versions 10.3.x prior to 10.3.2 MP1.
An attacker can exploit CVE-2014-1646 by sending a malformed certificate to cause a denial of service.
Yes, CVE-2014-1646 specifically targets Symantec's PGP Desktop and Encryption Desktop applications.