|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Windows >> PGP Desktop PGPserv Arbitrary Code Execution Vulnerability Vulnerability Assessment Details
|
PGP Desktop PGPserv Arbitrary Code Execution Vulnerability |
||
Checks version of PGP Desktop Detailed Explanation for this Vulnerability Assessment Summary : The remote Windows host has an application that is affected by a privilege escalation issue. Description : The version of PGP Desktop installed on the remote host reportedly can permit a remote authenticated user to execute arbitrary code on the affected host with LOCAL SYSTEM rights. The issue arises because the software operates a service named 'PGPServ' or 'PGPsdkServ' that exposes a named pipe that fails to validate the object data passed to it. See also : http://www.nessus.org/u?eaff6760 http://www.securityfocus.com/archive/1/458137/30/0/threaded Solution : Upgrade to PGP Desktop version 9.5.2 or later, as the change log suggests the issue has been addressed in that version. Network Security Threat Level: Medium / CVSS Base Score : 4.8 (AV:R/AC:H/Au:R/C:C/I:C/A:C/B:N) Networks Security ID: 22247 Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |