Critical security vulnerability found in Skype

A highly critical security vulnerability has been discovered in various flavours of the Skype IP telephony software.
A boundary error exists when handling Skype-specific URI types such as ‘callto://’ and ‘skype://’. This can be exploited to cause a buffer overflow and allows arbitrary code execution when the user clicks on a specially-crafted Skype-specific URL.

According to Secunia, the vulnerability is related to a boundary error in the handling of VCARD imports. It can be exploited to cause a buffer overflow and allows arbitrary code execution when the user imports a specially-crafted VCARD. There can also be annother boundary error in the handling of certain unspecified Skype client network traffic, which can be exploited to cause a heap-based buffer overflow. For more information go to secunia.com/advisories/17305/.

Users of Skype for Linux, Mac OS X, Pocket PC and Windows should update to the latest version at www.skype.com/download.

Source

Here we go :frowning:

i thought the NX bit was supposed to stop this crap.

many thanks for the heads up Mulda :thumbs:

rep points :smiley:

DT.