Insecure DLL loading in TeamViewer



Published: 2019-10-31
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-18196
CWE-ID CWE-427
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
TeamViewer
Client/Desktop applications / Other client software

Vendor TeamViewer

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Insecure DLL loading

EUVDB-ID: #VU22442

Risk: High

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-18196

CWE-ID: CWE-427 - Uncontrolled Search Path Element

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to the application loads DLL libraries in an insecure manner. A remote authenticated administrator can install DLL on the target system, restart a service and execute arbitrary code on victim's system.

Note: This vulnerability affects the following versions:

  • versions up to 11.0.133222 (fixed in 11.0.214397)
  • 12.0.X (fixed in 12.0.214399)
  • 13.X.X (fixed in 13.2.36216)
  • 14.X.X (fixed in 14.7.1965)
  • Mitigation

    Install updates from vendor's website.

    Vulnerable software versions

    TeamViewer: before 14.7.1965

    External links

    http://community.teamviewer.com/t5/Announcements/Security-bulletin-CVE-2019-18196/td-p/74564


    Q & A

    Can this vulnerability be exploited remotely?

    Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

    Is there known malware, which exploits this vulnerability?

    No. We are not aware of malware exploiting this vulnerability.



    ###SIDEBAR###