PGP Desktop < 9.5.1 PGPserv Arbitrary Code Execution

Medium Nessus Network Monitor Plugin ID 3893

Synopsis

The remote Windows host has an application that is affected by a privilege escalation issue.

Description

The version of PGP Desktop installed on the remote host reportedly can allow an authenticated remote user to execute arbitrary code on the affected host with LOCAL SYSTEM privileges. The issue arises because the software operates a service named 'PGPServ' or 'PGPsdkServ' that exposes a named pipe that fails to validate the object data passed to it.

Solution

Upgrade to version 9.5.1 or higher.

See Also

http://www.nessus.org/u?eaff6760

http://www.securityfocus.com/archive/1/458137/30/0/threaded

http://www.pgp.com

Plugin Details

Severity: Medium

ID: 3893

Family: SMTP Clients

Published: 2007/01/26

Modified: 2018/09/16

Dependencies: 1100, 2610, 2611

Nessus ID: 24246

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.2

Temporal Score: 4.4

Vector: CVSS2#AV:A/AC:L/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:U/RC:ND

CVSSv3

Base Score: 5.4

Temporal Score: 4.9

Vector: CVSS3#AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:U/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:pgp:corporate_desktop

Reference Information

CVE: CVE-2007-0603

BID: 22247