Vulnerabilities > CVE-2009-4741 - Unspecified vulnerability in EasyBits Extras Manager

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
skype
microsoft
critical
nessus

Summary

Unspecified vulnerability in the Extras Manager before 2.0.0.67 in Skype before 4.1.0.179 on Windows has unknown impact and attack vectors.

Vulnerable Configurations

Part Description Count
Application
Skype
144
OS
Microsoft
1

Nessus

NASL familyWindows
NASL idSKYPE_EXTRAS_MANAGER_VULN.NASL
descriptionThe version of Skype installed on the remote host ships with a version of the
last seen2020-06-01
modified2020-06-02
plugin id42148
published2009-10-15
reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/42148
titleSkype Extras Manager Unspecified Vulnerability (uncredentialed check)
code
#
# (C) Tenable Network Security, Inc.
#

if (NASL_LEVEL < 3000) exit(0);


include("compat.inc");

if (description)
{
  script_id(42148);
  script_version("1.13");
  script_cvs_date("Date: 2018/11/15 20:50:28");

  script_cve_id("CVE-2009-4741");
  script_bugtraq_id(36459);

  script_name(english:"Skype Extras Manager Unspecified Vulnerability (uncredentialed check)");
  script_summary(english:"Checks version of Skype");
 
  script_set_attribute(attribute:"synopsis", value:
"The remote Skype client is affected by a security vulnerability." );
  script_set_attribute(attribute:"description", value:
"The version of Skype installed on the remote host ships with a version
of the 'Skype Extras Manager' which is older than 2.0.0.67. 

The remote version of this package contains an unspecified security
vulnerability. 

Note this only affects Skype for Windows." );
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8a19c0fc" );
  script_set_attribute(attribute:"solution", value:
"Upgrade to Skype version 4.1.0.179 or later." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2009/10/12");
  script_set_attribute(attribute:"patch_publication_date", value:"2009/10/12");
  script_set_attribute(attribute:"plugin_publication_date", value:"2009/10/15");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:skype:skype");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");

  script_dependencies("skype_version.nbin", "smb_nativelanman.nasl");
  script_require_keys("Services/skype");
  script_require_ports(139, 445);

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");


# The flaw only affects Windows hosts.
if (report_paranoia < 2)
{
  os = get_kb_item("Host/OS/smb");
  if (!os) exit(0, "The 'Host/OS/smb' KB item is missing.");
  if ("Windows" >!< os) exit(0, "The issue only affects Windows hosts.");
}


port = get_service(svc:"skype", exit_on_fail:TRUE);

# nb: "ts = 910091106" => "version = 4.1.0.179"
ts = get_kb_item_or_exit("Skype/"+port+"/stackTimeStamp");
if (ts > 0 && ts < 910091106) security_warning(port);
else exit(0, "The Skype client listening on port "+port+" is not affected based on its timestamp ("+ts+").");