ID CVE-2010-3128
Summary Untrusted search path vulnerability in TeamViewer 5.0.8703 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .tvs or .tvc file.
References
Vulnerable Configurations
  • TeamViewer 1.85
    cpe:2.3:a:teamviewer:teamviewer:1.85
  • TeamViewer 2.44
    cpe:2.3:a:teamviewer:teamviewer:2.44
  • TeamViewer 3.6.5523
    cpe:2.3:a:teamviewer:teamviewer:3.6.5523
  • TeamViewer 4.1.8107
    cpe:2.3:a:teamviewer:teamviewer:4.1.8107
  • TeamViewer 5.0.8703
    cpe:2.3:a:teamviewer:teamviewer:5.0.8703
CVSS
Base: 9.3 (as of 26-08-2010 - 17:07)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
description TeamViewer <= 5.0.8703 DLL Hijacking Exploit (dwmapi.dll). CVE-2010-3128. Local exploit for windows platform
file exploits/windows/local/14734.c
id EDB-ID:14734
last seen 2016-02-01
modified 2010-08-24
platform windows
port
published 2010-08-24
reporter Glafkos Charalambous
source https://www.exploit-db.com/download/14734/
title TeamViewer <= 5.0.8703 DLL Hijacking Exploit dwmapi.dll
type local
nessus via4
NASL family Windows
NASL id TEAMVIEWER_5_0_9104.NASL
description The version of TeamViewer installed on the remote Windows host is earlier than 5.0.9104. Such versions insecurely look in their current working directory when resolving DLL dependencies, such as for 'dwmapi.dll'. Attackers may exploit the issue by placing a specially crafted DLL file and another file associated with the application in a location controlled by the attacker. When the associated file is launched, the attacker's arbitrary code can be executed.
last seen 2019-02-21
modified 2018-08-01
plugin id 49176
published 2010-09-10
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=49176
title TeamViewer Path Subversion Arbitrary DLL Injection Code Execution
oval via4
accepted 2013-12-16T04:01:50.804-05:00
class vulnerability
contributors
  • name SecPod Team
    organization SecPod Technologies
  • name Maria Kedovskaya
    organization ALTX-SOFT
definition_extensions
comment TeamViewer is installed
oval oval:org.mitre.oval:def:7018
description Untrusted search path vulnerability in TeamViewer 5.0.8703 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .tvs or .tvc file.
family windows
id oval:org.mitre.oval:def:6773
status accepted
submitted 2010-09-30T08:01:50
title Untrusted search path vulnerability via a Trojan horse dwmapi.dll in TeamViewer version less than or equal to 5.0.8703
version 6
refmap via4
bugtraq 20100825 TeamViewer <= 5.0.8703 DLL Hijacking Exploit (dwmapi.dll)
exploit-db 14734
secunia 41112
vupen ADV-2010-2174
Last major update 18-07-2011 - 22:39
Published 26-08-2010 - 14:36
Last modified 10-10-2018 - 16:01
Back to Top