TeamSpeak Client 2.x < Buffer Overflow

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.

Synopsis :

The remote Windows host contains an application that is susceptible to
buffer overflow.

Description :

According to its version, the instance of TeamSpeak 2.x Client, a VoIP
software collaboration application, installed on the remote host is
affected by a buffer overflow vulnerability.

An attacker can corrupt memory on such clients via a specially crafted
voice transmission packet sent via a TeamSpeak server. This corrupted
memory is later used during the teardown process and can lead to
execution of arbitrary code.

See also :

Solution :

Upgrade to version or later as that reportedly addresses the

Risk factor :

High / CVSS Base Score : 9.0
CVSS Temporal Score : 7.0
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 50603 ()

Bugtraq ID: 44502


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now