Lucene search

K
nessusThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.TEAMVIEWER_5_0_9104.NASL
HistorySep 10, 2010 - 12:00 a.m.

TeamViewer Path Subversion Arbitrary DLL Injection Code Execution

2010-09-1000:00:00
This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
www.tenable.com
83

The version of TeamViewer installed on the remote Windows host is earlier than 5.0.9104. Such versions insecurely look in their current working directory when resolving DLL dependencies, such as for ‘dwmapi.dll’.

Attackers may exploit the issue by placing a specially crafted DLL file and another file associated with the application in a location controlled by the attacker. When the associated file is launched, the attacker’s arbitrary code can be executed.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(49176);
  script_version("1.5");
  script_cvs_date("Date: 2018/08/01 17:36:15");

  script_cve_id("CVE-2010-3128");
  script_bugtraq_id(42687);
  script_xref(name:"EDB-ID", value:"14734");
  script_xref(name:"Secunia", value:"41112");

  script_name(english:"TeamViewer Path Subversion Arbitrary DLL Injection Code Execution");
  script_summary(english:"Checks version of TeamViewer.exe");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains a program that allows arbitrary code
execution.");

  script_set_attribute(attribute:"description", value:
"The version of TeamViewer installed on the remote Windows host is
earlier than 5.0.9104.  Such versions insecurely look in their current
working directory when resolving DLL dependencies, such as for
'dwmapi.dll'. 

Attackers may exploit the issue by placing a specially crafted DLL
file and another file associated with the application in a location
controlled by the attacker.  When the associated file is launched, the
attacker's arbitrary code can be executed.");
  script_set_attribute(attribute:"see_also", value:"http://www.teamviewer.com/download/changelog.aspx");

  script_set_attribute(attribute:"solution", value:"Upgrade to version 5.0.9104 or later.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"vuln_publication_date", value: "2010/08/24");
  script_set_attribute(attribute:"patch_publication_date", value:"2010/09/06");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/09/10");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");

  script_dependencies("teamviewer_detect.nasl");
  script_require_keys("SMB/TeamViewer/Installed");

  exit(0);
}

include("misc_func.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");

get_kb_item_or_exit('SMB/TeamViewer/Installed');

installs = get_kb_list('SMB/TeamViewer/*');

report = NULL;
fixed_version = '5.0.9104.0';

foreach install (keys(installs))
{
  if ('Install' >< install) continue;
  version = install - 'SMB/TeamViewer/';

  if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)
  {
     report += 
     '\n  Path              : ' + path + 
     '\n  Installed version : ' + version + 
     '\n  Fixed version     : ' + fixed_version + '\n';
  }
}

if(!isnull(report))
{
  if (report_verbosity > 0) security_hole(port:get_kb_item('SMB/transport'), extra:report);
  else security_hole(get_kb_item('SMB/transport'));
}
else exit(0, "No vulnerable TeamViewer installs were detected.");
Related for TEAMVIEWER_5_0_9104.NASL