First published: Sun May 21 2017(Updated: )
winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbitrary code in the DllMain function, then clicking on a mailto: link on a remote web page triggers the attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pegasus Mail Transport System | =4.72 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9046 is classified as a critical vulnerability due to the potential for remote code execution.
To mitigate CVE-2017-9046, ensure that the affected version of Pegasus Mail (v4.72) is updated to the latest version provided by the vendor.
CVE-2017-9046 allows an attacker to execute arbitrary code on your system if a malicious ssgp.dll is present locally.
CVE-2017-9046 affects Pegasus Mail version 4.72 build 572.
Prevent CVE-2017-9046 from being exploited by avoiding the execution of untrusted DLL files and regularly updating your software.