VID |
28141 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Skype software, according to its version number, has a heap-based buffer overflow vulnerability. Skype is a peer-to-peer (P2P) file sharing program used to share audio, video, and other media files and also provides telephone service over IP networks. Skype versions prior to 1.4.0.84 are vulnerable to a heap-based buffer overflow vulnerability via crafted network data with a large Object Counter value. By sending a specially-crafted network packet to UDP or TCP ports Skype is listening on, a remote attacker could exploit this vulnerability to cause the Skype client to crash and possibly execute arbitrary code on the affected host.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.securityfocus.com/archive/1/414519/30/0/threaded http://www.skype.com/security/skype-sb-2005-03.html http://secunia.com/advisories/17305/ http://www.kb.cert.org/vuls/id/905177
* Platforms Affected: Skype Technologies S.A., Skype versions prior to 1.4.0.84 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of Skype for Windows (1.4.0.84 or later), available from the Skype Web site at http://www.skype.com/products/skype/windows/ |
Related URL |
CVE-2005-3265,CVE-2005-3267 (CVE) |
Related URL |
15190,15192 (SecurityFocus) |
Related URL |
22848,22849,22850 (ISS) |
|