7.8
CVSSv2

CVE-2007-3956

Published: 24/07/2007 Updated: 29/09/2017
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 785
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

TeamSpeak WebServer 2.0 for Windows does not validate parameter value lengths and does not expire TCP sessions, which allows remote malicious users to cause a denial of service (CPU and memory consumption) via long username and password parameters in a request to login.tscmd on TCP port 14534.

Vulnerable Product Search on Vulmon Subscribe to Product

teamspeak web_server 2.0

Exploits

#!/usr/bin/perl # TeamSpeak 20 (Windows Release) Remote D0S Exploit by Yag Kohha (skyhole [at] gmailcom) # Vendor URL: wwwgoteamspeakcom/ # TeamSpeak WebServer has no tcp session expire and no checks for incoming values length # TODO: # Edit $target value # Run script # CPU 100%, Memory up for 12 Gb per one attack session # Greetz: ...