Skype 7.2.x / 7.35.x / 7.36.x < 7.37 MSFTEDIT.DLL RDP Session Clipboard Handling RCE

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

An instant messaging application installed on the remote Windows host
is affected by a remote code execution vulnerability.

Description :

The version of Skype installed on the remote Windows host is 7.2.x,
7.35.x, or 7.36.x prior to 7.37. It is, therefore, affected by a stack
buffer overflow condition in MSFTEDIT.DLL due to improper validation
of images taken from the RDP session clipboard and which are pasted
into the Skype message field when doing screen captures from an RDP
client. An unauthenticated, remote attacker can exploit this to cause
a denial of service condition or potentially the execution of
arbitrary code.

See also :

https://www.vulnerability-lab.com/get_content.php?id=2071
http://www.nessus.org/u?f60cb0f5

Solution :

Upgrade to Skype version 7.37 or later.

Risk factor :

Medium / CVSS Base Score : 5.1
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 3.8
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 101084 ()

Bugtraq ID: 99281

CVE ID: CVE-2017-9948

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now