Lucene search

K
packetstormChristian GaleonePACKETSTORM:143053
HistoryJun 20, 2017 - 12:00 a.m.

TeamSpeak Client 3.1.4 Buffer Overflow

2017-06-2000:00:00
Christian Galeone
packetstormsecurity.com
36

0.002 Low

EPSS

Percentile

62.1%

`#################################################################################################  
#  
# Title : TeamSpeak Client v3.1.4 - Buffer Overflow Vulnerability  
# Severity : Medium+/High  
# Reporter(s) : Christian Galeone  
# Software Name : TeamSpeak Client 3.1.4 & TeamSpeak Server 3.0.13.6  
# Vendor Home : http://teamspeak.com/  
# Date(s) : 25/04/2017 - By Christian Galeone  
# Tested in : Win10 - TeamSpeak Client 3.1.4 (12/04/2017 12:36:18) on Windows   
# TeamSpeak Server 3.0.13.6 (08/11/2016 09:48:33) on Linux  
# CVE(s) : CVE-2017-8290  
#  
##################################################################################################  
#   
# Effects:  
#   
# Client Crash (You) - Windows Clients ONLY.  
#   
# Note:  
#  
# For successfully reproduce the Issue, the following chars needs to be inserted inside the Name of a Channel.   
#  
# PoC:  
#  
# Insert the following Special Characters (add as much as you can - Copy and Paste x2):  
#   
# aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa  
#  
# Fix:  
#  
# - Remove the affected channel from a non-affected OS or remove it using YaTQA.  
#  
# - Exclude that charset from the standard characters used by TeamSpeak.  
#   
# - Update the version of your Client and Server -  
#  
# http://www.teamspeak.com/?page=downloads  
#  
# Credit(s):  
#  
# Christian Galeone  
#  
##################################################################################################  
`

0.002 Low

EPSS

Percentile

62.1%

Related for PACKETSTORM:143053