First published: Mon Dec 02 2019(Updated: )
An issue was discovered in the Chat functionality of the TeamViewer desktop application 14.3.4730 on Windows. (The vendor states that it was later fixed.) Upon login, every communication is saved within Windows main memory. When a user logs out or deletes conversation history (but does not exit the application), this data is not wiped from main memory, and therefore could be read by a local user with the same or greater privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Teamviewer Teamviewer | =14.3.4730 | |
Microsoft Windows | ||
All of | ||
Teamviewer Teamviewer | =14.3.4730 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-19362.
The severity of CVE-2019-19362 is medium with a severity value of 6.5.
The TeamViewer desktop application version 14.3.4730 on Windows is affected.
Upon login, every communication is saved within Windows main memory, which can lead to information disclosure.
Yes, the vendor states that it was later fixed.