Vulnerability CVE-2017-9046


Published: 2017-05-21

Description:
winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbitrary code in the DllMain function, then clicking on a mailto: link on a remote web page triggers the attack.

See advisories in our WLB2 database:
Topic
Author
Date
High
Pegasus winpm-32.exe v4.72 Mailto: Link Remote Code Execution
hyp3rlinx
20.05.2017

CVSS2 => (AV:L/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.4/10
6.4/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Pmail -> Pegasus 

 References:
https://packetstormsecurity.com/files/142606/Pegasus-4.72-Build-572-Remote-Code-Execution.html

Copyright 2024, cxsecurity.com

 

Back to Top