Description
PGP Desktop 10.0.x before 10.0.3 SP2 and 10.1.0 before 10.1.0 SP1 does not properly implement the "Decrypt/Verify File via Right-Click" functionality for multi-packet OpenPGP messages that represent multi-message input, which allows remote attackers to spoof signed data by concatenating an additional message to the end of a legitimately signed message, related to a "piggy-back" or "unsigned data injection" issue.
Published: 2010-11-20
Score: 4.3 Medium
EPSS: 1.8% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2010-3614 PGP Desktop 10.0.x before 10.0.3 SP2 and 10.1.0 before 10.1.0 SP1 does not properly implement the "Decrypt/Verify File via Right-Click" functionality for multi-packet OpenPGP messages that represent multi-message input, which allows remote attackers to spoof signed data by concatenating an additional message to the end of a legitimately signed message, related to a "piggy-back" or "unsigned data injection" issue.
History

No history.

Subscriptions

Pgp Desktop For Mac Desktop For Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-07T03:18:53.018Z

Reserved: 2010-09-27T00:00:00.000Z

Link: CVE-2010-3618

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-11-22T13:00:16.957

Modified: 2026-04-29T01:13:23.040

Link: CVE-2010-3618

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses