ports/130608: vuxml submission for audio/teamspeak_server
Mark Foster
mark at foster.cc
Fri Jan 16 06:40:02 UTC 2009
>Number: 130608
>Category: ports
>Synopsis: vuxml submission for audio/teamspeak_server
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: update
>Submitter-Id: current-users
>Arrival-Date: Fri Jan 16 06:40:01 UTC 2009
>Closed-Date:
>Last-Modified:
>Originator: Mark Foster
>Release: 7.1
>Organization:
Credentia
>Environment:
FreeBSD frau.foster.cc 7.1-RELEASE-p1 FreeBSD 7.1-RELEASE-p1 #4: Sat Jan 10 20:04:30 PST 2009 root at frau.foster.cc:/usr/obj/usr/src/sys/GENERIC i386
>Description:
>How-To-Repeat:
>Fix:
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="400a149d-3b56-4fa3-8481-675156b9f1d8">
<topic>teamspeak_server -- TeamSpeak help Command Directory Traversal Vulnerability</topic>
<affects>
<package>
<name>teamspeak_server</name>
<range><le>2.0.23.17</le></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>SecurityFocus reports:</p>
<blockquote cite="http://www.securityfocus.com/bid/33256">
<p>TeamSpeak is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data.
Exploiting the issue may allow an attacker to obtain sensitive information that could aid in further attacks.
Versions of TeamSpeak up to and including 2.0.23.17 are vulnerable to this issue.</p>
</blockquote>
</body>
</description>
<references>
<url>http://www.securityfocus.com/bid/33256</url>
<bid>33256</bid>
</references>
<dates>
<discovery>2009-01-14</discovery>
<entry>2009-01-15</entry>
</dates>
</vuln>
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list