VID |
28183 |
Severity |
30 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The PGP Desktop, according to its version number, has a privilege escalation vulnerability. PGP Desktop versions prior to 9.5.2 could allow a remote authenticated attacker to gain elevated privileges, caused by improper validation in the PGPServ.exe and PGPsdkServ.exe services. A local attacker (or remote authenticated attacker) could send a specially crafted object to the service interface to execute arbitrary code on the affected host with LocalSystem privileges.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://pgp.custhelp.com/cgi-bin/pgp.cfg/php/enduser/std_adp.php?p_faqid=703 http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-pgp-desktop/ http://www.securityfocus.com/archive/1/458137/30/0/threaded http://securitytracker.com/alerts/2007/Jan/1017563.html
* Platforms Affected: PGP Desktop versions prior to 9.5.2 Apple Mac OS X Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of PGP Desktop (9.5.2 or later), available from the PGP Desktop Web site at http://www.pgp.com/ |
Related URL |
CVE-2007-0603 (CVE) |
Related URL |
22247 (SecurityFocus) |
Related URL |
31830 (ISS) |
|