close
Secunia Advisory: SA27934  
Release Date: 2007-12-07

Critical:
Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch

Software:Skype for Windows 3.x

CVE reference:CVE-2007-5989 (Secunia mirror)

  Want to know the next time vulnerabilities are fixed in this product?
- Companies can be alerted via email and SMS!
Description

:
A vulnerability has been discovered in Skype, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error in Skype4COM.dll within the "skype4com" URI handler when processing short strings. This can be exploited to cause a limited heap-based buffer overflow as a longer string may be copied into a heap-based buffer previously allocated based on the length of the supplied URI.

Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website.

The vulnerability is confirmed in Skype 3.5.0.239. Other versions prior to 3.6.0.216 may also be affected.

Secunia has constructed the Online Software Inspector, which you can use to check if your local system is vulnerable. If you wish to scan your corporate network, then please refer to the Network Software Inspector.

Solution:
Update to version 3.6.0.216 or later.

Provided and/or discovered by:
Reported by an anonymous person via ZDI.

Changelog:
2007-12-07: Added additional information based on research by Secunia Research.

Original Advisory:
ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-07-070.html


arrow
arrow
    全站熱搜
    創作者介紹
    創作者 ivan0914 的頭像
    ivan0914

    I'n Blog 之萬象真藏

    ivan0914 發表在 痞客邦 留言(0) 人氣()