CERTA-2010-AVI-566
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été corrigée dans PGP Desktop permettant à un utilisateur malveillant de compromettre l'intégrité des données présentes dans un message PGP signé.
Description
Une vulnérabilité a été corrigée dans PGP Desktop permettant à un utilisateur malveillant d'insérer des données dans un message signé considéré ensuite comme valide.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Toutes les versions de PGP Desktop antérieures à la version 10.0.3 SP2.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eToutes les versions de PGP Desktop ant\u00e9rieures \u00e0 la version 10.0.3 SP2.\u003c/P\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans PGP Desktop permettant \u00e0 un\nutilisateur malveillant d\u0027ins\u00e9rer des donn\u00e9es dans un message sign\u00e9\nconsid\u00e9r\u00e9 ensuite comme valide.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3618"
}
],
"links": [],
"reference": "CERTA-2010-AVI-566",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans PGP Desktop permettant \u00e0 un\nutilisateur malveillant de compromettre l\u0027int\u00e9grit\u00e9 des donn\u00e9es\npr\u00e9sentes dans un message PGP sign\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans PGP Desktop",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Symantec SYM10-012 du 18 novembre 2010",
"url": "http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20101118_00"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…