An issue was discovered in the Chat functionality of the TeamViewer desktop application 14.3.4730 on Windows. (The vendor states that it was later fixed.) Upon login, every communication is saved within Windows main memory. When a user logs out or deletes conversation history (but does not exit the application), this data is not wiped from main memory, and therefore could be read by a local user with the same or greater privileges.
References
Link | Resource |
---|---|
http://nestedif.com/teamviewer-vulnerability-improper-session-handling-leading-to-information-disclosure-advisory/ | Exploit Third Party Advisory URL Repurposed |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-12-02T02:52:34
Updated: 2019-12-02T02:52:34
Reserved: 2019-11-27T00:00:00
Link: CVE-2019-19362
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-12-02T03:15:11.347
Modified: 2024-02-14T01:17:43.863
Link: CVE-2019-19362
JSON object: View
Redhat Information
No data.
CWE