winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbitrary code in the DllMain function, then clicking on a mailto: link on a remote web page triggers the attack.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/142606/Pegasus-4.72-Build-572-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-05-21T14:00:00
Updated: 2017-05-21T14:57:01
Reserved: 2017-05-17T00:00:00
Link: CVE-2017-9046
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-05-21T14:29:00.260
Modified: 2017-06-02T19:06:06.807
Link: CVE-2017-9046
JSON object: View
Redhat Information
No data.
CWE