In association with heise online

02 August 2007, 12:32

Vulnerability in TeamSpeak 2 server

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

A hole in the TeamSpeak server 2.x for Windows and Linux makes it possible to retrieve arbitrary files from the server and exploit the retrieved information for further attacks. If, for example, server administration is handled via PLESK management software it would be possible to retrieve the password to gain administrative access to the system.

All versions of the teleconferencing software up to and including 2.0.23.17 are affected, but the bug has been fixed in the beta version 2.0.23.19 for Windows and Linux. However, the officially stable version of TeamSpeak stopped at 2.0.20.1. For security reasons, users should switch to the beta version or restrict access to TCP port 51234. This should be done as soon as possible since the vulnerability is very easily exploited. Heise Security has already received a non-public exploit.

Heise Security has also received information from a TeamSpeak hoster who wishes to remain anonymous. According to this source, Teamspeak 2 authorised hosters were not informed about the problem by the manufacturer. Hosters also only found out about the DoS hole reported last week through independent sources. We are told that insider circles are increasingly annoyed about the way this has been handled but dare not voice their criticism since TeamSpeak 3 is due to be released in the near future, and only selected hosters will get permission to offer it.

See also:

(mba)

Print Version | Send by email | Permalink: http://h-online.com/-733382
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit