4.4
CVSSv2

CVE-2017-9046

Published: 21/05/2017 Updated: 02/06/2017
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.3 | Impact Score: 5.9 | Exploitability Score: 1.3
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbitrary code in the DllMain function, then clicking on a mailto: link on a remote web page triggers the attack.

Vulnerable Product Search on Vulmon Subscribe to Product

pmail pegasus 4.72

Exploits

Pegasus version 472 build 572 suffers from a mailto link remote code execution vulnerability ...