First published: Wed Jul 17 2019(Updated: )
In LogMeIn join.me before 3.16.0.5505, an attacker could execute arbitrary commands on a targeted system. This vulnerability is due to unsafe search paths used by the application URI that is defined in Windows. An attacker could exploit this vulnerability by convincing a targeted user to follow a malicious link. Successful exploitation could cause the application to load libraries from the directory targeted by the URI link. The attacker could use this behavior to execute arbitrary commands on the system with the privileges of the targeted user if the attacker can place a crafted library in a directory that is accessible to the vulnerable system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LogMeIn | <3.16.0.5505 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13637 is considered a high severity vulnerability due to its potential to allow arbitrary command execution.
To fix CVE-2019-13637, update LogMeIn join.me to version 3.16.0.5505 or later.
CVE-2019-13637 affects all versions of LogMeIn join.me prior to 3.16.0.5505 on Windows systems.
Yes, CVE-2019-13637 can be exploited remotely if an attacker convinces a targeted user to follow a malicious link.
The risks of CVE-2019-13637 include unauthorized command execution, which can lead to data theft or system compromise.