First published: Wed Apr 23 2014(Updated: )
Symantec PGP Desktop 10.0.x through 10.2.x and Encryption Desktop Professional 10.3.x before 10.3.2 MP1 do not properly perform block-data moves, which allows remote attackers to cause a denial of service (read access violation and application crash) via a malformed certificate.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
PGP Desktop | =10.0.0 | |
PGP Desktop | =10.0.1 | |
PGP Desktop | =10.0.2 | |
PGP Desktop | =10.0.3 | |
PGP Desktop | =10.1.0 | |
PGP Desktop | =10.1.1 | |
PGP Desktop | =10.1.2 | |
PGP Desktop | =10.2.0 | |
PGP Desktop | =10.2.1 | |
PGP Desktop | =10.2.2 | |
Symantec Encryption Desktop | =10.3.0 | |
Symantec Encryption Desktop | =10.3.1 | |
Symantec Encryption Desktop | =10.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1647 is considered a high severity vulnerability due to the potential for denial of service caused by application crashes.
To fix CVE-2014-1647, upgrade to Symantec PGP Desktop version 10.3.2 MP1 or later.
CVE-2014-1647 affects Symantec PGP Desktop versions 10.0.x through 10.2.x and Encryption Desktop Professional version 10.3.x before 10.3.2 MP1.
Yes, CVE-2014-1647 can be exploited remotely by sending a malformed certificate to the vulnerable application.
The impact of CVE-2014-1647 includes read access violations and application crashes, leading to denial of service.