TeamViewer Path Subversion Arbitrary DLL Injection Code Execution

This script is Copyright (C) 2010-2011 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a program that allows arbitrary code
execution.

Description :

The version of TeamViewer installed on the remote Windows host is
earlier than 5.0.9104. Such versions insecurely look in their current
working directory when resolving DLL dependencies, such as for
'dwmapi.dll'.

Attackers may exploit the issue by placing a specially crafted DLL
file and another file associated with the application in a location
controlled by the attacker. When the associated file is launched, the
attacker's arbitrary code can be executed.

See also :

http://www.teamviewer.com/download/changelog.aspx

Solution :

Upgrade to version 5.0.9104 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.4
(CVSS2#E:F/RL:W/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 49176 ()

Bugtraq ID: 42687

CVE ID: CVE-2010-3128

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now