Skype file: URI Handling Security Bypass Arbitrary Code Execution (uncredentialed check)

High Nessus Plugin ID 33125


The remote Skype client is affected by a security policy bypass vulnerability.


The version of Skype installed on the remote host reportedly uses improper logic in its 'file:' URI handler when validating URLs by failing to check for certain dangerous file extensions and checking for others in a case-sensitive manner.

If an attacker can trick a user on the affected host into clicking on a specially crafted 'file:' URI, this issue could be leveraged to execute arbitrary code on the affected system subject to the user's privileges.

Note this only affects Skype for Windows.


Upgrade to Skype version or later.

See Also

Plugin Details

Severity: High

ID: 33125

File Name: skype_2008_003.nasl

Version: $Revision: 1.15 $

Type: remote

Agent: windows

Family: Windows

Published: 2008/06/06

Modified: 2014/06/06

Dependencies: 21208, 10785

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:skype:skype

Required KB Items: Services/skype

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2008-1805, CVE-2008-2545

BID: 29553

OSVDB: 46010

Secunia: 30547

CWE: 20