PGP Desktop 10.0.x before 10.0.3 SP2 and 10.1.0 before 10.1.0 SP1 does not properly implement the "Decrypt/Verify File via Right-Click" functionality for multi-packet OpenPGP messages that represent multi-message input, which allows remote attackers to spoof signed data by concatenating an additional message to the end of a legitimately signed message, related to a "piggy-back" or "unsigned data injection" issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2010-3614 PGP Desktop 10.0.x before 10.0.3 SP2 and 10.1.0 before 10.1.0 SP1 does not properly implement the "Decrypt/Verify File via Right-Click" functionality for multi-packet OpenPGP messages that represent multi-message input, which allows remote attackers to spoof signed data by concatenating an additional message to the end of a legitimately signed message, related to a "piggy-back" or "unsigned data injection" issue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-07T03:18:53.018Z

Reserved: 2010-09-27T00:00:00

Link: CVE-2010-3618

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2010-11-22T13:00:16.957

Modified: 2025-04-11T00:51:21.963

Link: CVE-2010-3618

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses