CVE-2021-34859 is a vulnerability in TeamViewer
Published on October 25, 2021
This vulnerability allows remote attackers to execute arbitrary code on affected installations of TeamViewer 15.16.8.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TVS files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13697.
Weakness Type
What is a Buffer Overflow Vulnerability?
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CVE-2021-34859 has been classified to as a Buffer Overflow vulnerability or weakness.
Products Associated with CVE-2021-34859
Want to know whenever a new CVE is published for TeamViewer? stack.watch will email you.
Affected Versions
TeamViewer Version 15.16.8.0 is affected by CVE-2021-34859Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.