TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (buffer overflow and application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab containing [img]//http:// substrings.
References
Link | Resource |
---|---|
http://r4p3.net/forum/reverse-engineering/38/teamspeak-3-exploit-bb-code-freeze-crash-not-responding/905 | Broken Link |
http://r4p3.net/public/ts3bbcodefreeze.txt | Broken Link |
http://www.securityfocus.com/bid/70219 | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96889 | Third Party Advisory VDB Entry |
https://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2018-01-08 19:29
Updated : 2024-02-04 19:29
NVD link : CVE-2014-7221
Mitre link : CVE-2014-7221
CVE.ORG link : CVE-2014-7221
JSON object : View
Products Affected
teamspeak
- teamspeak3
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer