vendor:
PGP4Pine
by:
Eric AUGE
7.5
CVSS
HIGH
Buffer Overrun
120
CWE
Product Name: PGP4Pine
Affected Version From: 1.76
Affected Version To: 1.76
Patch Exists: YES
Related CWE: N/A
CPE: pgp4pine
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2003
Buffer Overrun Vulnerability in PGP4Pine
A vulnerability has been discovered in PGP4Pine. The problem occurs when parsing an email message for PGP data. Due to insufficient bounds checking, when processing lines of excessive length, a buffer may be overrun. This would result in sensitive locations in memory being overwritten with data supplied in the message. Successful exploitation of this issue may allow a remote attacker to execute arbitrary commands on a target system. All instructions executed would be run with the privileges of the users running the software.
Mitigation:
Ensure that all input is properly validated and sanitized before being used in any application.