Vulnerabilities > CVE-2014-3436 - Cryptographic Issues vulnerability in Symantec Encryption Desktop and PGP Desktop

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Symantec Encryption Desktop 10.3.x before 10.3.2 MP3, and Symantec PGP Desktop 10.0.x through 10.2.x, allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted encrypted e-mail message that decompresses to a larger size.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SYMANTEC_ENCRYPTION_DESKTOP_CVE-2014-3436.NASL
    descriptionThe version of Symantec Encryption Desktop installed on the remote Mac OS X host is version 10.x prior to 10.3.2 MP3. It is, therefore, affected by a denial of service vulnerability. The flaw is due to a failure to properly limit decompressed file size during the decryption process of a specially crafted encrypted email. Decryption of an excessively large compressed message could cause high memory and CPU usage resulting in a denial of service as the system becomes unresponsive during the decompression attempt.
    last seen2020-06-01
    modified2020-06-02
    plugin id77407
    published2014-08-27
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/77407
    titleSymantec Encryption Desktop 10.x < 10.3.2 MP3 DoS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(77407);
      script_version("1.4");
      script_cvs_date("Date: 2018/07/14  1:59:36");
    
      script_cve_id("CVE-2014-3436");
      script_bugtraq_id(69259);
    
      script_name(english:"Symantec Encryption Desktop 10.x < 10.3.2 MP3 DoS");
      script_summary(english:"Checks the Symantec Encryption Desktop version.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Mac OS X host has a data encryption application installed
    that is affected by a denial of service vulnerability.");
      script_set_attribute(attribute:"description", value:
    "The version of Symantec Encryption Desktop installed on the remote Mac
    OS X host is version 10.x prior to 10.3.2 MP3. It is, therefore,
    affected by a denial of service vulnerability. The flaw is due to a
    failure to properly limit decompressed file size during the decryption
    process of a specially crafted encrypted email. Decryption of an
    excessively large compressed message could cause high memory and CPU
    usage resulting in a denial of service as the system becomes
    unresponsive during the decompression attempt.");
      # http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140821_00
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8e650426");
      script_set_attribute(attribute:"solution", value:"Upgrade to Symantec Encryption Desktop 10.3.2 MP3 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/08/21");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/08/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/08/27");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:symantec:encryption_desktop");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:symantec:pgp_desktop");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
    
      script_dependencies("macosx_symantec_encryption_desktop_installed.nbin");
      script_require_keys("Host/MacOSX/Version","Host/local_checks_enabled","installed_sw/Symantec Encryption Desktop");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("install_func.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/MacOSX/Version")) audit(AUDIT_OS_NOT, "Mac OS X");
    
    appname = 'Symantec Encryption Desktop';
    get_install_count(app_name:appname, exit_if_zero:TRUE);
    
    install = get_single_install(app_name:appname,exit_if_unknown_ver:TRUE);
    version = install["version"];
    path    = install["path"];
    port    = 0;
    
    # For this version line, we NEED the build #
    if(version == "10.3.2")
      audit(AUDIT_VER_NOT_GRANULAR,appname+" / PGP Desktop",version);
    
    if (
      # 10.0.0 - 10.3.1 vulnerable
      (ver_compare(ver:version,fix:"10.0.0",strict:FALSE) >= 0 &&
       ver_compare(ver:version,fix:"10.3.2",strict:FALSE) <  0)
      ||
      # 10.3.2 before build 15495 vulnerable
      (version =~ "^10\.3\.2\." &&
       ver_compare(ver:version,fix:"10.3.2.15495",strict:TRUE) < 0)
    )
    {
      report =
        '\n  Path              : ' + path +
        '\n  Installed version : ' + version+
        '\n  Fixed version     : 10.3.2 MP3 (Build 15495)';
    }
    else audit(AUDIT_INST_PATH_NOT_VULN, appname+" / PGP Desktop", version, path);
    
    if (report_verbosity > 0) security_warning(port:port, extra:report);
    else security_warning(port);
    
  • NASL familyWindows
    NASL idSYMANTEC_ENCRYPTION_DESKTOP_CVE-2014-3436.NASL
    descriptionThe version of Symantec Encryption Desktop installed on the remote host is version 10.x prior to 10.3.2 MP3. It is, therefore, affected by a denial of service vulnerability. The flaw is due to a failure to properly limit decompressed file size during the decryption process of a specially crafted encrypted email. Decryption of an excessively large compressed message could cause high memory and CPU usage resulting in a denial of service as the system becomes unresponsive during the decompression attempt.
    last seen2020-06-01
    modified2020-06-02
    plugin id77406
    published2014-08-27
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/77406
    titleSymantec Encryption Desktop 10.x < 10.3.2 MP3 DoS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(77406);
      script_version("1.6");
      script_cvs_date("Date: 2018/08/01 17:36:15");
    
      script_cve_id("CVE-2014-3436");
      script_bugtraq_id(69259);
    
      script_name(english:"Symantec Encryption Desktop 10.x < 10.3.2 MP3 DoS");
      script_summary(english:"Checks the Symantec Encryption Desktop version.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host has a data encryption application installed that is
    affected by a denial of service vulnerability.");
      script_set_attribute(attribute:"description", value:
    "The version of Symantec Encryption Desktop installed on the remote
    host is version 10.x prior to 10.3.2 MP3. It is, therefore, affected
    by a denial of service vulnerability. The flaw is due to a failure to
    properly limit decompressed file size during the decryption process of
    a specially crafted encrypted email. Decryption of an excessively
    large compressed message could cause high memory and CPU usage
    resulting in a denial of service as the system becomes unresponsive
    during the decompression attempt.");
      # http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140821_00
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8e650426");
      script_set_attribute(attribute:"solution", value:"Upgrade to Symantec Encryption Desktop 10.3.2 MP3 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/08/21");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/08/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/08/27");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:symantec:encryption_desktop");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:symantec:pgp_desktop");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
    
      script_dependencies("symantec_encryption_desktop_installed.nbin");
      script_require_keys("SMB/Registry/Enumerated", "installed_sw/Symantec Encryption Desktop");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("install_func.inc");
    
    get_kb_item_or_exit("SMB/Registry/Enumerated");
    
    appname = 'Symantec Encryption Desktop';
    get_install_count(app_name:appname, exit_if_zero:TRUE);
    
    install = get_single_install(app_name:appname,exit_if_unknown_ver:TRUE);
    version = install["version"];
    path    = install["path"];
    port    = get_kb_item("SMB/transport");
    if (!port) port = 445;
    
    # For this version line, we NEED the build #
    if(version == "10.3.2")
      audit(AUDIT_VER_NOT_GRANULAR,appname+"/ PGP Desktop",version);
    
    if (
      # 10.0.0 - 10.3.1 vulnerable
      (ver_compare(ver:version,fix:"10.0.0",strict:FALSE) >= 0 &&
       ver_compare(ver:version,fix:"10.3.2",strict:FALSE) <  0)
      ||
      # 10.3.2 before build 15495 vulnerable
      (version =~ "^10\.3\.2\." &&
       ver_compare(ver:version,fix:"10.3.2.15495",strict:TRUE) < 0)
    )
    {
      report =
        '\n  Path              : ' + path +
        '\n  Installed version : ' + version+
        '\n  Fixed version     : 10.3.2 MP3 (Build 15495)';
    }
    else audit(AUDIT_INST_PATH_NOT_VULN, appname+"/ PGP Desktop", version, path);
    
    if (report_verbosity > 0) security_warning(port:port, extra:report);
    else security_warning(port);