PGP Desktop 10.0.x before 10.0.3 SP2 and 10.1.0 before 10.1.0 SP1 does not properly implement the "Decrypt/Verify File via Right-Click" functionality for multi-packet OpenPGP messages that represent multi-message input, which allows remote attackers to spoof signed data by concatenating an additional message to the end of a legitimately signed message, related to a "piggy-back" or "unsigned data injection" issue.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-07T03:18:53.018Z
Reserved: 2010-09-27T00:00:00
Link: CVE-2010-3618

No data.

Status : Modified
Published: 2010-11-22T13:00:16.957
Modified: 2024-11-21T01:19:14.390
Link: CVE-2010-3618

No data.