GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation66 reference(s) from NVD