CVE-2014-7222
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
08/01/2018
Last modified:
30/01/2018
Description
Buffer overflow in TeamSpeak Client 3.0.14 and earlier allows remote authenticated users to cause a denial of service (application crash) by connecting to a channel with a different client instance, and placing crafted data in the Chat/Server tab with two \\ (backslash) characters, a digit, a \ (backslash) character, and "z" in a series of nested img BBCODE tags.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:teamspeak:teamspeak3:*:*:*:*:client:*:*:* | 3.0.14 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/128571/TeamSpeak-Client-3.0.14-Buffer-Overflow.html
- http://r4p3.net/forum/reverse-engineering/38/teamspeak-3-exploit-bb-code-freeze-crash-not-responding/905/
- http://r4p3.net/public/ts3bbcodefreeze.txt
- http://www.securityfocus.com/bid/70219
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96890



