Secunia Advisory: | SA27934 | |
Release Date: | 2007-12-07 | |
Critical: | ![]() Highly critical | |
Impact: | System access | |
Where: | From remote | |
Solution Status: | Vendor Patch | |
Software: | Skype for Windows 3.x | |
CVE reference: | CVE-2007-5989 (Secunia mirror) | |
Want to know the next time vulnerabilities are fixed in this product? - Companies can be alerted via email and SMS! |
:
A vulnerability has been discovered in Skype, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error in Skype4COM.dll within the "skype4com" URI handler when processing short strings. This can be exploited to cause a limited heap-based buffer overflow as a longer string may be copied into a heap-based buffer previously allocated based on the length of the supplied URI.
Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website.
The vulnerability is confirmed in Skype 3.5.0.239. Other versions prior to 3.6.0.216 may also be affected.
Secunia has constructed the Online Software Inspector, which you can use to check if your local system is vulnerable. If you wish to scan your corporate network, then please refer to the Network Software Inspector.
Solution:
Update to version 3.6.0.216 or later.
Provided and/or discovered by:
Reported by an anonymous person via ZDI.
Changelog:
2007-12-07: Added additional information based on research by Secunia Research.
Original Advisory:
ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-07-070.html