Privilege Escalation via Trojan Horse DLL in NoMachine

Privilege Escalation via Trojan Horse DLL in NoMachine

CVE-2018-17980 · MEDIUM Severity

AV:N/AC:M/AU:N/C:P/I:P/A:P

NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is executed. (The directory could, in general, be on a local filesystem or a network share.).

Learn more about our Network Penetration Testing.