TeamViewer Connection Handling Remote Overflow Denial of Service

High Nessus Plugin ID 49175


The remote Windows host contains a program that is affected by a remote denial of service vulnerability.


The version of TeamViewer installed on the remote Windows host is earlier than 5.0.8421. Such versions are affected by a remote denial of service vulnerability when receiving data from clients.

By sending malformed packets to the server, a remote attacker can cause CPU usage to stay at 100% for the duration of the connection, thereby causing responsiveness issues on the affected system.


Upgrade to version 5.0.8421 or later.

See Also

Plugin Details

Severity: High

ID: 49175

File Name: teamviewer_5_0_8421.nasl

Version: $Revision: 1.4 $

Type: local

Agent: windows

Family: Windows

Published: 2010/09/10

Modified: 2011/03/18

Dependencies: 52715

Risk Information

Risk Factor: High


Base Score: 7.8

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

Required KB Items: SMB/TeamViewer/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/05/22

Vulnerability Publication Date: 2009/02/02

Reference Information

BID: 40242

OSVDB: 64821

Secunia: 39869