Vulnerabilities > CVE-2007-0603 - Remote Code Execution vulnerability in PGP Corporate Desktop 9.5
Attack vector
NETWORK Attack complexity
HIGH Privileges required
SINGLE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
PGP Desktop before 9.5.1 does not validate data objects received over the (1) \pipe\pgpserv named pipe for PGPServ.exe or the (2) \pipe\pgpsdkserv named pipe for PGPsdkServ.exe, which allows remote authenticated users to gain privileges by sending a data object representing an absolute pointer, which causes code execution at the corresponding address.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Windows |
NASL id | PGP_DESKTOP_PGPSERV_PRIV_ESCALATION.NASL |
description | The version of PGP Desktop installed on the remote host reportedly can allow a remote, authenticated user to execute arbitrary code on the affected host with LOCAL SYSTEM privileges. The issue arises because the software operates a service named |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24246 |
published | 2007-01-26 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24246 |
title | PGP Desktop PGPserv Crafted Data Object Arbitrary Code Execution |
code |
|
References
- http://archives.neohapsis.com/archives/vulnwatch/2007-q1/0025.html
- http://osvdb.org/32969
- http://osvdb.org/32970
- http://secunia.com/advisories/23938
- http://securityreason.com/securityalert/2203
- http://securitytracker.com/id?1017563
- http://www.kb.cert.org/vuls/id/102465
- http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-pgp-desktop/
- http://www.securityfocus.com/archive/1/458137/100/0/threaded
- http://www.securityfocus.com/bid/22247
- http://www.vupen.com/english/advisories/2007/0356