Forum


Notice to all users

We are migrating towards a new forum system located at community.teamspeak.com, as such this forum will become read-only on January 29, 2020

Page 1 of 2 12 LastLast
Results 1 to 15 of 22
  1. #1
    Join Date
    February 2016
    Posts
    8

    Server crashes (virtualserverbase.cpp:2381)

    Error connected with filetransfer

    2016-02-13 22:33:16.849859|CRITICAL|VirtualServerBase| 1| Assertion "connectionPtr != __null" failed at server/serverlib/virtualserverbase.cpp:2381;

    2016-02-13 22:38:57.044051|CRITICAL|VirtualServerBase| 1| Assertion "connectionPtr != __null" failed at server/serverlib/virtualserverbase.cpp:2381;

  2. #2
    Join Date
    January 2013
    Posts
    6

    Server crashes

    Greetings,

    server crashes, version 3.0.12.1.
    running on linux.

    Code:
    |CRITICAL|VirtualServerBase|1  |Assertion "connectionPtr != __null" failed at ../../../../s/deps/teamspeak_server_lib/src/ts_server/virtualserverbase.cpp:2497;

  3. #3
    Join Date
    February 2016
    Posts
    1
    I have same problem as you, so maybe Teamspeak should give us a refound our money for this troubles? Every day I must be online to restore my crashed server.
    Best regards DreakSpeak

    log:
    Code:
    2016-02-13 21:30:12.087810|CRITICAL|VirtualServerBase|  1| Assertion "connectionPtr != __null" failed at server/serverlib/virtualserverbase.cpp:2381;
    last person who connect to the server:
    Code:
    2016-02-13 21:30:09.940491|INFO    |VirtualServerBase|  1| client connected 'TeamSleep'(id:158918) from 149.56.15.51:58717

  4. #4
    Join Date
    September 2012
    Posts
    6,079
    We need the complete log files, your operating system and version, as well as the server version and how you started it. Also which user is running the server.
    When sending PMs please make sure to include a reference link to the thread in question in the body of your message.

  5. #5
    Join Date
    April 2013
    Posts
    43
    Quote Originally Posted by Chris View Post
    We need the complete log files, your operating system and version, as well as the server version and how you started it. Also which user is running the server.
    TS SERVER: 3.0.12.1
    Debian 7 64bit
    Running by normal user
    Command: ./ts3server_startscript.sh start

    Code:
    2016-02-13 220:16.111502|CRITICAL|VirtualServerBase|1  |Assertion "connectionPtr != __null" failed at ../../../../s/deps/teamspeak_server_lib/src/ts_server/virtualserverbase.cpp:2497;

  6. #6
    Join Date
    October 2011
    Posts
    34
    Got the same crash with the same error as the above user on 3.0.11.4. I have now migrated to 3.0.12.1 (no crashes yet)
    Running debian 7.8 64bit.

    Code:
    2016-02-14 00:00:59.479526|CRITICAL|VirtualServerBase|  1| Assertion "connectionPtr != __null" failed at server/serverlib/virtualserverbase.cpp:2381;
    It has happened once and I'm not able to reproduce it again.
    If it happens again I'll provide the debug logs as per instructions.

  7. #7
    Join Date
    January 2013
    Posts
    6
    Quote Originally Posted by DreamSpeak View Post
    I have same problem as you, so maybe Teamspeak should give us a refound our money for this troubles? Every day I must be online to restore my crashed server.
    Best regards DreakSpeak

    log:
    Code:
    2016-02-13 21:30:12.087810|CRITICAL|VirtualServerBase|  1| Assertion "connectionPtr != __null" failed at server/serverlib/virtualserverbase.cpp:2381;
    last person who connect to the server:
    Code:
    2016-02-13 21:30:09.940491|INFO    |VirtualServerBase|  1| client connected 'TeamSleep'(id:158918) from 149.56.15.51:58717
    Same guy in last connect logs. TeamSleep uses an exploit.

  8. #8
    Join Date
    February 2016
    Posts
    1
    Same for us :

    2016-02-14 03:43:29.912369|CRITICAL|VirtualServerBase|1 |Assertion "connectionPtr != __null" failed at ../../../../s/deps/teamspeak_server_lib/src/ts_server/virtualserverbase.cpp:2497;

    2016-02-14 03:43:28.106479|INFO |VirtualServerBase|1 |client connected 'TeamSleep'(id:89495) from 149.56.15.51:63084

  9. #9
    Join Date
    October 2011
    Posts
    34
    Update:
    Server also crashed on 3.0.12.1. Collecting logs now. Apparently an exploit...

    Same:
    Code:
    2016-02-14 11:55:07.076058|INFO    |VirtualServerBase|1  |client connected 'TeamSleep'(id:108925) from 149.56.15.51:49423

  10. #10
    Join Date
    April 2009
    Location
    Spain
    Posts
    7

    Angry

    Same problem.

    New exploit... http://forum.teamspeak.com/threads/1...released/page2

    2 versions 2 exploits, this is not serious

  11. #11
    Join Date
    February 2016
    Posts
    1

    Stop Crash! Stop Explot! & TS3 DROPPER LIMITED

    Hello,

    3.0.12.1
    You must ban this nick!

    Code:
    Name: ([t|T]eam[S|s]leep)([0-9]+)?
    Interpert IP/Name as: Regular Expression
    Duration: 0 [Permanent]
    
    or
    
    iptables -I INPUT -s 149.56.15.51 -p tcp -j REJECT
    iptables -I INPUT -s 149.56.15.51 -p udp -j REJECT
    3.0.12

    Code:
    Ban TYPE:
    - Regular Expression
    Nickname ban:
    - [a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9][a-z|A-Z|0-9]
    Time:
    - Permanet
    Reson:
    - STOP CRASHING.
    TS3FUCK LIMITED & TS3DROPPER etc.

    Code:
    /sbin/iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
    /sbin/iptables -A INPUT -i lo -j ACCEPT
    /sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags FIN,ACK FIN -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags PSH,ACK PSH -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags ACK,URG URG -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags FIN,RST FIN,RST -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,PSH,ACK,URG -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,PSH,URG -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,ACK,URG -j DROP
    /sbin/iptables -A INPUT -f -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 19 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 123 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 161 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 1433 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 1900 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 27015 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 27950 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 27952 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 27960 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 27965 -j DROP
    /sbin/iptables -A INPUT -p icmp -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 19329 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 53 -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --sport 53 -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --sport 19329 -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --sport 5353 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 5353 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 7143 -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --sport 7143 -j DROP
    /sbin/iptables -A INPUT -p tcp -m tcp --sport 123 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 123 -j DROP
    /sbin/iptables -A INPUT -p udp -m udp --sport 111 -j DROP
    /sbin/iptables -A INPUT -p udp -m tcp --sport 111 -j DROP
    /sbin/iptables -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
    /sbin/iptables -A OUTPUT -p icmp -j DROP
    /sbin/iptables -N syn-flood
    /sbin/iptables -A syn-flood -m limit --limit 10/sec --limit-burst 15 -j RETURN
    /sbin/iptables -A syn-flood -j LOG --log-prefix "SYN flood: "
    /sbin/iptables -A syn-flood -j DROP
    /sbin/iptables -A INPUT -s 31.14.135.45 -j DROP
    /sbin/iptables -A INPUT -s 5.249.159.251 -j DROP
    /sbin/iptables -N ts3droper
    /sbin/iptables -A INPUT -p udp -m udp -m string --algo bm --hex-string '|545333494e|' -m limit --limit 250/s --limit-burst 250 -j ACCEPT
    /sbin/iptables -A INPUT -p udp -m udp -m string --algo bm --hex-string '|545333494e|' -j ts3droper
    /sbin/iptables -A INPUT -p udp -m udp -m string --algo bm --hex-string '|ab41ce52ce69|' -m limit --limit 250 --limit-burst 250 -j ACCEPT
    /sbin/iptables -A INPUT -p udp -m udp -m string --algo bm --hex-string '|ab41ce52ce69|' -j ts3droper
    /sbin/iptables -A INPUT -p udp -m udp -m string --algo bm --hex-string '|0df0aa8f61b9|' -m limit --limit 250 --limit-burst 250 -j ACCEPT
    /sbin/iptables -A INPUT -p udp -m udp -m string --algo bm --hex-string '|0df0aa8f61b9|' -j ts3droper
    /sbin/iptables -A ts3droper -m limit --limit 100/min -j LOG --log-prefix "TS3droper: " --log-level 4
    /sbin/iptables -A ts3droper -j DROP
    Code:
    /sbin/iptables -A INPUT -s 31.14.135.45 -j DROP
    /sbin/iptables -A INPUT -s 5.249.159.251 -j DROP
    This is arubacloud.pl / arubacloud.it
    75% attack from aruba servers.

  12. #12
    Join Date
    February 2016
    Posts
    8

    filetransfer exploit

    3.16.0-4-amd64 #1 SMP Debian 3.16.7-ckt20-1+deb8u2 (2016-01-02) x86_64 GNU/Linux

    try this guys

    iptables -A INPUT -s 0/0 -p tcp --dport 30033 -j DROP

    Server Uptime:19 hours 41 minutes 33 seconds

  13. #13
    Join Date
    February 2016
    Posts
    8

    again crash

    2016-02-14 22:04:29.157101|CRITICAL|VirtualServerBase| 1| Assertion "connectionPtr != __null" failed at server/serverlib/virtualserverbase.cpp:2381;
    server info : 3.16.0-4-amd64 #1 SMP Debian 3.16.7-ckt20-1+deb8u2 (2016-01-02) x86_64 GNU/Linux server ver : 3.0.11.4

    I found this site https :// r4p3 . net/

    3.0.11.4
    ---
    3.0.12
    Server Crash (VIP)
    Server Crash (Public) ->will be released a little bit after a fix has been released.
    3.0.12.1
    Server Crash for all Versions so far!(VIP)
    Last edited by b4deK; February 15th, 2016 at 12:13 PM.

  14. #14
    Join Date
    October 2014
    Posts
    10

    Angry

    Can anyone confirm if the exploit can be avoided if I just block connections on filetransfere port? I know that new users will get errors, but currently I couldn't care less.

  15. #15
    Join Date
    October 2012
    Posts
    33

    Solved Protection crashes

    first step


    # Block ports from anywhere
    -A INPUT -m state --state NEW -m tcp -p tcp --dport 30033 -j DROP

    or

    Second Step


    # limits and blocks TCP 30033
    -A INPUT -p tcp --dport 30033 -m limit --limit 2/sec --limit-burst 20 -j ACCEPT
    -A INPUT -p tcp --dport 30033 -m limit --limit 2/sec --limit-burst 20 -j LOG --log-prefix "TCP-FLOOD:"
    -A INPUT -p tcp --dport 30033 -j DROP


    Commands Activation

    /sbin/iptables-restore < /etc/iptables.up.rules



    Good Luck

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Replies: 1
    Last Post: November 17th, 2014, 08:47 AM
  2. VirtualServerBase is shutting my server down
    By aansem in forum Server Support
    Replies: 0
    Last Post: July 15th, 2014, 04:53 AM
  3. Server crashes
    By Sagaceil in forum General Questions
    Replies: 4
    Last Post: August 26th, 2011, 03:17 PM
  4. Server crashes
    By Gerhard90 in forum Server Support
    Replies: 1
    Last Post: January 21st, 2010, 09:20 PM
  5. Server crashes
    By 3D-GRAF in forum Linux / FreeBSD
    Replies: 6
    Last Post: January 10th, 2010, 12:59 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •