Skype skype: URI Handling /Datapath Argument Injection Settings Manipulation (uncredentialed check)

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote Skype client is affected by an information disclosure
vulnerability.

Description :

According to its timestamp, the version of Skype installed on the
remote Windows host fails to sanitize input in its URI handler to its
'/Datapath' argument, which specifies the location of the Skype
configuration files and security policy.

If an attacker can trick a user on the affected system into clicking
on a specially crafted link, the client could be used on a Datapath
location on a remote SMB share. In turn, this could lead to man-in-
the-middle attacks or the disclosure of sensitive information, such
as call history associated with the user.

See also :

http://www.security-assessment.com/files/advisories/Skype_URI_Handling_Vulnerability.pdf
http://www.securityfocus.com/archive/1/510017/30/0/threaded
https://developer.skype.com/WindowsSkype/ReleaseNotes
http://share.skype.com/sites/garage/2010/03/10/ReleaseNotes_4.2.0.155.pdf

Solution :

Upgrade to Skype 4.2.0.155 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 45060 ()

Bugtraq ID: 38699

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now