2 results (0.010 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

Buffer overflow in TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab with two \\ (backslash) characters, a digit, a \ (backslash) character, and "z" in a series of nested img BBCODE tags. Desbordamiento de búfer en el cliente de TeamSpeak 3.0.14 y anteriores permite que los usuarios autenticados remotos provoquen una denegación de servicio (cierre inesperado de la aplicación) conectándose a un canal con una instancia de cliente diferente y ubicando datos manipulados en la pestaña de Chat/Server con dos caracteres \\ (barra invertida), un dígito, un \ (barra invertida), y "z" en una serie de etiquetas BBCDOE img anidadas. TeamSpeak Client version 3.0.14 suffers from a buffer overflow vulnerability. • https://www.exploit-db.com/exploits/34857 http://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html http://r4p3.net/forum/reverse-engineering/38/teamspeak-3-exploit-bb-code-freeze-crash-not-responding/905 http://r4p3.net/public/ts3bbcodefreeze.txt http://www.securityfocus.com/bid/70219 https://exchange.xforce.ibmcloud.com/vulnerabilities/96890 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (buffer overflow and application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab containing [img]//http:// substrings. El cliente de TeamSpeak 3.0.14 y anteriores permite que los usuarios autenticados remotos provoquen una denegación de servicio (desbordamiento de búfer y cierre inesperado de la aplicación) conectándose a un canal con una instancia de cliente diferente y ubicando datos manipulados en la pestaña de Chat/Server que contiene subcadenas [img]//http://. TeamSpeak Client version 3.0.14 suffers from a buffer overflow vulnerability. • https://www.exploit-db.com/exploits/34857 http://r4p3.net/forum/reverse-engineering/38/teamspeak-3-exploit-bb-code-freeze-crash-not-responding/905 http://r4p3.net/public/ts3bbcodefreeze.txt http://www.securityfocus.com/bid/70219 https://exchange.xforce.ibmcloud.com/vulnerabilities/96889 https://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •