TeamViewer Connection Handling Remote Overflow Denial of Service

high Nessus Plugin ID 49175

Language:

Synopsis

The remote Windows host contains a program that is affected by a remote denial of service vulnerability.

Description

The version of TeamViewer installed on the remote Windows host is earlier than 5.0.8421. Such versions are affected by a remote denial of service vulnerability when receiving data from clients.

By sending malformed packets to the server, a remote attacker can cause CPU usage to stay at 100% for the duration of the connection, thereby causing responsiveness issues on the affected system.

Solution

Upgrade to version 5.0.8421 or later.

See Also

http://www.teamviewer.com/download/changelog.aspx

Plugin Details

Severity: High

ID: 49175

File Name: teamviewer_5_0_8421.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 9/10/2010

Updated: 8/8/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

Required KB Items: SMB/TeamViewer/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/22/2010

Vulnerability Publication Date: 2/2/2009

Reference Information

BID: 40242

Secunia: 39869