CVE-2019-15502
 
Severity Score
7.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The TeamSpeak client before 3.3.2 allows remote servers to trigger a crash via the 0xe2 0x81 0xa8 0xe2 0x81 0xa7 byte sequence, aka Unicode characters U+2068 (FIRST STRONG ISOLATE) and U+2067 (RIGHT-TO-LEFT ISOLATE).
El cliente TeamSpeak versiones anteriores a 3.3.2, permite a los servidores remotos activar un bloqueo por medio de la secuencia de bytes 0xe2 0x81 0xa8 0xe2 0x81 0xa7, tambiƩn se conoce como caracteres Unicode U+2068 (FIRST STRONG ISOLATE) y U+2067 (RIGHT-TO-LEFT ISOLATE).
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2019-08-23 CVE Reserved
- 2019-08-29 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-08-22 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://r4p3.net/threads/teamkilled-new-teamspeak-crash.8144 | 2024-08-05 | |
https://www.youtube.com/watch?v=PlVbPIs75D4 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://forum.teamspeak.com/threads/141134-Release-TeamSpeak-Client-3-3-2 | 2020-08-24 |