First published: Mon Nov 22 2010(Updated: )
PGP Desktop 10.0.x before 10.0.3 SP2 and 10.1.0 before 10.1.0 SP1 does not properly implement the "Decrypt/Verify File via Right-Click" functionality for multi-packet OpenPGP messages that represent multi-message input, which allows remote attackers to spoof signed data by concatenating an additional message to the end of a legitimately signed message, related to a "piggy-back" or "unsigned data injection" issue.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
PGP Desktop | <=10.0.3 | |
PGP Desktop | =10.0.0 | |
PGP Desktop | =10.0.1 | |
PGP Desktop | =10.0.2 | |
PGP Desktop | =10.0.3 | |
PGP Desktop | =10.1.0 | |
Symantec PGP Desktop | <=10.0.3 | |
Symantec PGP Desktop | =10.0.0 | |
Symantec PGP Desktop | =10.0.1 | |
Symantec PGP Desktop | =10.0.2 | |
Symantec PGP Desktop | =10.0.3 | |
Symantec PGP Desktop | =10.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3618 is considered a high severity vulnerability due to its potential to spoof signed data.
To fix CVE-2010-3618, upgrade to PGP Desktop 10.0.3 SP2 or 10.1.0 SP1 or later.
CVE-2010-3618 affects PGP Desktop versions 10.0.0 to 10.0.3 SP1 and 10.1.0 before 10.1.0 SP1.
CVE-2010-3618 allows remote attackers to spoof signed data through manipulation of multi-packet OpenPGP messages.
Yes, CVE-2010-3618 is present in both the Windows and Mac versions of PGP Desktop.