SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VoIP)  >   Microsoft Skype Vendors:   Skype Technologies
Microsoft Skype Library Loading Bug Lets Remote Users Execute Arbitrary Code on the Target System in Certain Cases
SecurityTracker Alert ID:  1038209
SecurityTracker URL:  http://securitytracker.com/id/1038209
CVE Reference:   CVE-2017-6517   (Links to External Site)
Date:  Apr 8 2017
Impact:   Execution of arbitrary code via network, User access via network
Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 7.16.0.102
Description:   A vulnerability was reported in Microsoft Skype. A remote user can cause arbitrary code to be executed on the target user's system in certain cases.

A remote user can create a specially crafted DLL. When the target user installs Skype from the same directory as the specially crafted DLL (e.g., "Downloads"), the DLL will load and Skype will execute arbitrary code in the DLL.

The original advisory is available at:

https://packetstormsecurity.com/files/141650/Skype-7.16.0.102-DLL-Hijacking.html

Sachin Wagh (tiger_tigerboy) reported this vulnerability.

Impact:   A remote user can cause arbitrary code to be executed on the target user's system.
Solution:   No vendor advisory is available at the time of this entry.

[Editor's note: The vendor acknowledged the researcher in June 2016. However, no Microsoft Bulletins or Advisories for June 2016 mention Skype.]

Vendor URL:  www.microsoft.com/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [FD] Skype Insecure Library Loading Vulnerability (api-ms-win-core-winrt-string-l1-1-0.dll)
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 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC