This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.
The remote Windows host contains an eBook reader that is affected by a
buffer overflow vulnerability.
All versions of Mobipocket Reader are potentially affected by a
stack-based buffer overflow vulnerability.
The application does not properly validate user input and can allow
crafted 'CHM' files to either crash the application or execute
arbitrary code if an attack is successful.
Note that Mobipocket Reader is no longer supported which implies no
new security patches will be released.
See also :
Remove the software as it is no longer supported.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.4
Public Exploit Available : true