CVE-2013-1610
Published Aug 5, 2013
Last updated 11 years ago
Overview
- Description
- Unquoted Windows search path vulnerability in RDDService in Symantec PGP Desktop 10.0.x through 10.2.x and Symantec Encryption Desktop 10.3.0 before MP3 allows local users to gain privileges via a Trojan horse application in the %SYSTEMDRIVE% top-level directory.
- Source
- secure@symantec.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 10
- Exploitability score
- 3.1
- Vector string
- AV:L/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/426.html 'Untrusted Search Path CWE-426'
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:encryption_desktop:10.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "838DEBE6-2A04-4737-8282-5E7803B483A7" }, { "criteria": "cpe:2.3:a:symantec:pgp_desktop:10.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EBF6909-8372-4264-8510-53482589D3D4" }, { "criteria": "cpe:2.3:a:symantec:pgp_desktop:10.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A873C35-C480-4A3D-A0B2-5BDAF794B80C" }, { "criteria": "cpe:2.3:a:symantec:pgp_desktop:10.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D7928F8-9E18-495B-AF0A-FE64B3CA88A0" }, { "criteria": "cpe:2.3:a:symantec:pgp_desktop:10.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59BEA5BE-2595-4BE5-B0CC-405748925F9E" }, { "criteria": "cpe:2.3:a:symantec:pgp_desktop:10.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFA810A7-C21B-4314-88CE-CC0018D6209F" }, { "criteria": "cpe:2.3:a:symantec:pgp_desktop:10.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6D6C464E-45C2-44B7-B474-4165C7FF9FE7" }, { "criteria": "cpe:2.3:a:symantec:pgp_desktop:10.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38F4B912-92AA-4438-80EE-C3C46775D59C" }, { "criteria": "cpe:2.3:a:symantec:pgp_desktop:10.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E5D7E1B-44AE-4EB7-940C-7010D92A1CFC" }, { "criteria": "cpe:2.3:a:symantec:pgp_desktop:10.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B704ED7-8438-4BCF-B062-5303C3D9CAAB" }, { "criteria": "cpe:2.3:a:symantec:pgp_desktop:10.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01D5E4E1-B128-4E77-A137-BA435082720C" } ], "operator": "OR" } ] } ]