Vulnerability Description
winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbitrary code in the DllMain function, then clicking on a mailto: link on a remote web page triggers the attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pmail | Pegasus | 4.72 |
Related Weaknesses (CWE)
References
- https://packetstormsecurity.com/files/142606/Pegasus-4.72-Build-572-Remote-Code-ExploitThird Party AdvisoryVDB Entry
- https://packetstormsecurity.com/files/142606/Pegasus-4.72-Build-572-Remote-Code-ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2017-9046?
CVE-2017-9046 is a vulnerability with a CVSS score of 7.3 (HIGH). winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbit...
How severe is CVE-2017-9046?
CVE-2017-9046 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-9046?
Check the references section above for vendor advisories and patch information. Affected products include: Pmail Pegasus.