This vulnerability allows remote attackers to execute arbitrary code on affected installations of TeamViewer 15.16.8.0. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated array. The specific flaw exists within the TeamViewer service. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of TeamViewer. Knowledge of the crash event and the TeamViewer ID as well as either possession of the pre-crash connection password or local authenticated access to the machine would have allowed to establish a remote connection by reusing the not properly deleted connection password. TeamViewer Linux versions before 15.28 do not properly execute a deletion command for the connection password in case of a process crash.
0 Comments
Leave a Reply. |