Input validation error in pegasus - CVE-2017-9046
Published: May 21, 2017 / Updated: August 8, 2020
pegasus
Detailed vulnerability description
The vulnerability allows a local authenticated user to execute arbitrary code.
winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbitrary code in the DllMain function, then clicking on a mailto: link on a remote web page triggers the attack.