First published: Sat Jun 21 2014(Updated: )
Symantec PGP Desktop 10.x, and Encryption Desktop Professional 10.3.x before 10.3.2 MP2, on OS X uses world-writable permissions for temporary files, which allows local users to bypass intended restrictions on file reading, modification, creation, and permission changes via unspecified vectors.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Encryption Desktop | =10.3.0 | |
Symantec Encryption Desktop | =10.3.1 | |
Symantec Encryption Desktop | =10.3.2 | |
Symantec Encryption Desktop | =10.3.2-mp1 | |
PGP Desktop | =10.0.0 | |
PGP Desktop | =10.0.1 | |
PGP Desktop | =10.0.2 | |
PGP Desktop | =10.0.3 | |
PGP Desktop | =10.1.0 | |
PGP Desktop | =10.1.1 | |
PGP Desktop | =10.1.2 | |
PGP Desktop | =10.2.0 | |
PGP Desktop | =10.2.1 | |
PGP Desktop | =10.2.2 | |
macOS Yosemite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3431 is classified as having a moderate severity level due to its potential impact on file permissions.
To fix CVE-2014-3431, update Symantec PGP Desktop or Encryption Desktop Professional to version 10.3.2 MP2 or later.
CVE-2014-3431 allows local users to bypass intended restrictions, leading to unauthorized modification and access to sensitive files.
CVE-2014-3431 affects Symantec PGP Desktop 10.x and Encryption Desktop Professional 10.3.x prior to version 10.3.2 MP2.
No, macOS itself is not vulnerable to CVE-2014-3431, but the affected Symantec software running on it is.