Vulnerabilities > CVE-2007-3956 - Unspecified vulnerability in Teamspeak web Server 2.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN teamspeak
exploit available
Summary
TeamSpeak WebServer 2.0 for Windows does not validate parameter value lengths and does not expire TCP sessions, which allows remote attackers to cause a denial of service (CPU and memory consumption) via long username and password parameters in a request to login.tscmd on TCP port 14534.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
Application | 1 |
Exploit-Db
description | TeamSpeak 2.0 (Windows Release) Remote Denial of Service Exploit. CVE-2007-3956. Dos exploit for windows platform |
file | exploits/windows/dos/4205.pl |
id | EDB-ID:4205 |
last seen | 2016-01-31 |
modified | 2007-07-20 |
platform | windows |
port | |
published | 2007-07-20 |
reporter | YAG KOHHA |
source | https://www.exploit-db.com/download/4205/ |
title | TeamSpeak 2.0 Windows Release Remote Denial of Service Exploit |
type | dos |
References
- http://osvdb.org/38595
- http://osvdb.org/38595
- http://secunia.com/advisories/26141
- http://secunia.com/advisories/26141
- http://www.securityfocus.com/bid/24977
- http://www.securityfocus.com/bid/24977
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35518
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35518
- https://www.exploit-db.com/exploits/4205
- https://www.exploit-db.com/exploits/4205