CVE-2014-7222

Buffer overflow in TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab with two \\ (backslash) characters, a digit, a \ (backslash) character, and "z" in a series of nested img BBCODE tags.
Configurations

Configuration 1 (hide)

cpe:2.3:a:teamspeak:teamspeak3:*:*:*:*:client:*:*:*

History

21 Nov 2024, 02:16

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html - Exploit, Third Party Advisory, VDB Entry
References () http://r4p3.net/forum/reverse-engineering/38/teamspeak-3-exploit-bb-code-freeze-crash-not-responding/905/ - Broken Link () http://r4p3.net/forum/reverse-engineering/38/teamspeak-3-exploit-bb-code-freeze-crash-not-responding/905/ - Broken Link
References () http://r4p3.net/public/ts3bbcodefreeze.txt - Broken Link () http://r4p3.net/public/ts3bbcodefreeze.txt - Broken Link
References () http://www.securityfocus.com/bid/70219 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/70219 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/96890 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/96890 - Third Party Advisory, VDB Entry

Information

Published : 2018-01-08 19:29

Updated : 2024-11-21 02:16


NVD link : CVE-2014-7222

Mitre link : CVE-2014-7222

CVE.ORG link : CVE-2014-7222


JSON object : View

Products Affected

teamspeak

  • teamspeak3
CWE
CWE-20

Improper Input Validation