Summary
This host is installed with TeamSpeak client and is prone to arbitrary command execution vulnerability.
Impact
Successful exploitation could allow an attacker to execute arbitrary code in the context of the user running the application.
Impact Level: Application.
Solution
Upgrade to the Teamspeak 3 or later
For updates refer to http://www.tsviewer.com/index.php?page=teamspeak
Insight
The specific flaw exists within the 'TeamSpeak.exe' module, teardown procedure responsible for freeing dynamically allocated application handles.
Affected
Teamspeak 2 version 2.0.32.60
References
Severity
Classification
-
CVSS Base Score: 4.0
AV:N/AC:H/Au:N/C:P/I:P/A:N
Related Vulnerabilities
- Adobe Reader Plugin Signature Bypass Vulnerability (Linux)
- Adobe Reader Cross-Site Scripting & Denial of Service Vulnerabilities (Windows)
- Apple Safari Address Bar Spoofing Vulnerability june-10 (Win)
- Apache Tomcat XML External Entity Information Disclosure Vulnerability
- Adobe Reader Multiple Unspecified Vulnerabilities Jun06 (Mac OS X)