7/23/2023 0 Comments Techsmith relay classic recorder![]() Untrusted search path vulnerability in TechSmith Snagit 10 (Build 788) allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a snag, snagcc, or snagprof file. The vulnerability was introduced in SnagIT Windows 12.4.1. TechSmith Relay Classic Recorder prior to 5.2.1 on Windows is vulnerable. UploaderService in SnagIT 2019.1.2 allows elevation of privilege by placing an invalid presentation file in %PROGRAMDATA%\TechSmith\TechSmith Recorder\QueuedPresentations and then creating a symbolic link in %PROGRAMDATA%\Techsmith\TechSmith Recorder\InvalidPresentations that points to an arbitrary folder with an arbitrary file name. ![]() A new window will open and give you the options to download the recorder for your PC. Go to the gearshift in the top right hand corner and download the Classic Recorder 3. In TechSmith SnagIt 11.2.1 through 20.0.3, an XML External Entity (XXE) injection issue exists that would allow a local attacker to exfiltrate data under the local Administrator account. Go to the TechSmith relay site using your NetID and Password log into your personal TechSmith library. Mediasite and Camtasia Relay 3.0 together provide an end to end workflow for recording user generated content using the Relay Recorder and automatically.
0 Comments
Leave a Reply. |