2 results (0.004 seconds)

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Heap-based buffer overflow in the message decoding functionality for PGP Outlook Encryption Plug-In, as used in NAI PGP Desktop Security 7.0.4, Personal Security 7.0.3, and Freeware 7.0.3, allows remote attackers to modify the heap and gain privileges via a large, malformed mail message. Desbordamiento de búfer en el plug-in de cifrado PGP para Outlook, usado en NAI PGP Destokp Security 7.0.4, Personal Security 7.0.3 y Freeware 7.0.3 (Utilidades Norton), permite a atacantes remotos modificar el montón (heap) y ganar privilegios mediante un mensaje de correo electrónico grande y malformado. • http://download.nai.com/products/licensed/pgp/desktop_security/windows/version_7.04/hotfix/ReadMe.txt http://marc.info/?l=bugtraq&m=102634756815773&w=2 http://marc.info/?l=ntbugtraq&m=102639521518942&w=2 http://www.iss.net/security_center/static/9525.php http://www.kb.cert.org/vuls/id/821139 http://www.osvdb.org/4364 http://www.securityfocus.com/bid/5202 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

PGP Corporate Desktop before 7.1, Personal Security before 7.0.3, Freeware before 7.0.3, and E-Business Server before 7.1 does not properly display when invalid userID's are used to sign a message, which could allow an attacker to make the user believe that the document has been signed by a trusted third party by adding a second, invalid user ID to a key which has already been signed by the third party, aka the "PGPsdk Key Validity Vulnerability." • http://www.osvdb.org/1946 http://www.pgp.com/support/product-advisories/pgpsdk.asp http://www.securityfocus.com/archive/1/211806 http://www.securityfocus.com/bid/3280 https://exchange.xforce.ibmcloud.com/vulnerabilities/7081 •