First published: Mon Oct 15 2018(Updated: )
NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is executed. (The directory could, in general, be on a local filesystem or a network share.).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NoMachine NoMachine | <5.3.27 | |
NoMachine NoMachine | >=6.0.0<6.3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-17980 is high, with a severity value of 7.8.
Attackers can gain privileges by placing a Trojan horse wintab32.dll file in the same directory as a .nxs file and executing it.
NoMachine versions before 5.3.27 and between 6.0.0 and 6.3.6 are affected by CVE-2018-17980.
You can find more information about CVE-2018-17980 [here](http://hyp3rlinx.altervista.org/advisories/NOMACHINE-TROJAN-FILE-REMOTE-CODE-EXECUTION.txt), [here](http://packetstormsecurity.com/files/149784/NoMachine-5.3.26-Remote-Code-Execution.html), and [here](https://www.exploit-db.com/exploits/45611/).
The CWE ID for CVE-2018-17980 is 426.