First published: Mon Nov 22 2010(Updated: )
PGP Desktop 10.0.x before 10.0.3 SP2 and 10.1.0 before 10.1.0 SP1 does not properly implement the "Decrypt/Verify File via Right-Click" functionality for multi-packet OpenPGP messages that represent multi-message input, which allows remote attackers to spoof signed data by concatenating an additional message to the end of a legitimately signed message, related to a "piggy-back" or "unsigned data injection" issue.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pgp Desktop For Windows | =10.0.1 | |
Pgp Desktop For Windows | =10.0.2 | |
Pgp Desktop For Windows | =10.1.0 | |
Pgp Desktop For Windows | =10.0.3 | |
Pgp Desktop For Windows | =10.0.0 | |
Pgp Desktop For Windows | <=10.0.3 | |
Pgp Desktop For Mac | =10.1.0 | |
Pgp Desktop For Mac | =10.0.2 | |
Pgp Desktop For Mac | =10.0.1 | |
Pgp Desktop For Mac | <=10.0.3 | |
Pgp Desktop For Mac | =10.0.0 | |
Pgp Desktop For Mac | =10.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.