As far as I know you're only allowed to test it on your own server, did you send yourself en e-mail?
Hahahahaha DD
Check the last sentence of the first post. "/Update"Mind releasing the code if they don't reply? You've kept the madness contained but if they don't want to fix it the chaos will convince TeamSpeak to fix it.
- oh well..Check the last sentence of the first post. "/Update"
They don't control the updates the teamspeak3 server gets tho. | http://www.nfoservers.com/- oh well..
>that moment when r4p3 ts is running x.2 because no one except r4p3 can crash their server - I wonder if a downgrade will happen IF it is realesed
Downgrading would be pointless- oh well..
>that moment when r4p3 ts is running x.2 because no one except r4p3 can crash their server - I wonder if a downgrade will happen IF it is realesed
Well that sucks..Downgrading would be pointless
...Upgrading also :3
Well. I would say we are about to see .4 tomorrow - because it's monday.
Watching some posts in this thread i'm hoping that it won't be released without a patch against it.
Nice but please dont publish it! Use it for your private ... i hate the 12 years old kiddys that crash big ts servers...Now a little bit of storry first:
We contacted TeamSpeak on 2/March that we did find a new vulnerability in TeamSpeak Server 3.0.12.2. Since they released 3.0.12.3 today, they might think they're secure. Well, as you can see below... they are really not.
We will release the exploit in about one week if TeamSpeak doesnt reply to our Email. (Only reply, not fixing anyting). Seems fair to me.
So here you've got the PoC video for version 3.0.12.3, released today (4/March/2016). The video only shows 3.0.12.3, but it also works for all versions below 3.0.12.3
Credits go to: @Kaptan647 @Derp @ehthe @Asphyxia @Supervisor
/Update: TeamSpeak did reply to us, so we might not release the exploit in one week. We'll see.