Vulnerabilities > CVE-2011-2074 - Unspecified vulnerability in Skype
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN skype
nessus
Summary
Unspecified vulnerability in the client in Skype 5.x before 5.1.0.922 on Mac OS X allows remote authenticated users to execute arbitrary code or cause a denial of service (application crash) via a crafted message.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 7 | |
OS | 1 |
Nessus
NASL family Misc. NASL id SKYPE_5_1_0_922.NASL description According to its timestamp, the version of Skype installed on the remote Mac OS X host reportedly allows an attacker to send a specially crafted message to a user on the affected host and execute arbitrary code. Note that by default, such a message would have to come from someone in a user last seen 2020-06-01 modified 2020-06-02 plugin id 53845 published 2011-05-09 reporter This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/53845 title Skype for Mac 5.x < 5.1.0.922 Unspecified Remote Code Execution (uncredentialed check) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(53845); script_version("1.7"); script_cvs_date("Date: 2018/07/27 18:38:14"); script_cve_id("CVE-2011-2074"); script_bugtraq_id(47747); script_name(english:"Skype for Mac 5.x < 5.1.0.922 Unspecified Remote Code Execution (uncredentialed check)"); script_summary(english:"Checks Skype timestamp"); script_set_attribute( attribute:"synopsis", value:"The remote Skype client allows arbitrary code execution." ); script_set_attribute( attribute:"description", value: "According to its timestamp, the version of Skype installed on the remote Mac OS X host reportedly allows an attacker to send a specially crafted message to a user on the affected host and execute arbitrary code. Note that by default, such a message would have to come from someone in a user's Skype Contact List." ); # http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?6a8cef8d" ); # http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?c36790c1" ); script_set_attribute( attribute:"solution", value:"Upgrade to Skype for Mac 5.1.0.922 or later." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2011/05/06"); script_set_attribute(attribute:"patch_publication_date", value:"2011/04/14"); script_set_attribute(attribute:"plugin_publication_date", value:"2011/05/09"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:skype:skype"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc."); script_dependencies("skype_version.nbin", "os_fingerprint.nasl"); script_require_keys("Services/skype"); script_require_ports("Services/www"); exit(0); } include("global_settings.inc"); include("misc_func.inc"); port = get_service(svc:"skype", exit_on_fail:TRUE); # The flaw only affects Mac OS X hosts. skype_version = get_kb_item("Skype/"+port+"/skypeVersion"); if (!isnull(skype_version)) { if ("Mac OS X" >!< skype_version) exit(0, "The "+skype_version+" install listening on port "+port+" is not affected since it's not Skype for Mac."); } else { if (report_paranoia < 2) { os = get_kb_item_or_exit("Host/OS"); if ("Mac OS X" >!< os) exit(0, "The host does not appear to be running Mac OS X."); } } # nb: "ts = 1103301002" => "version = 5.1.0.922" # "ts = 1101202353" => "version = 5.0.0.7980". ts = get_kb_item_or_exit("Skype/"+port+"/stackTimeStamp"); if (ts >= 1101202353 && ts < 1103301002) { if (report_verbosity > 0 && !isnull(skype_version)) { report = '\n Installed version : ' + skype_version + '\n Fixed version : Skype for Mac OS X Version 5.1.0.922\n'; security_warning(port:port, extra:report); } security_warning(port); exit(0); } else { if (isnull(skype_version)) exit(0, "The Skype install listening on port "+port+" is not affected based on its timestamp ("+ts+")."); else exit(0, "The Skype install listening on port "+port+" is not affected based on its version ("+skype_version+")."); }
NASL family MacOS X Local Security Checks NASL id MACOSX_SKYPE_5_1_0_922.NASL description According to its version, the instance of Skype installed on the remote Mac OS X host reportedly allows an attacker to send a specially crafted message to a user on the affected host and execute arbitrary code. Note that by default, such a message would have to come from someone in a user last seen 2020-06-01 modified 2020-06-02 plugin id 53844 published 2011-05-09 reporter This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/53844 title Skype for Mac 5.x < 5.1.0.922 Unspecified Remote Code Execution (credentialed check) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(53844); script_version("1.7"); script_cvs_date("Date: 2018/07/14 1:59:35"); script_cve_id("CVE-2011-2074"); script_bugtraq_id(47747); script_name(english:"Skype for Mac 5.x < 5.1.0.922 Unspecified Remote Code Execution (credentialed check)"); script_summary(english:"Checks version of Skype from Info.plist"); script_set_attribute( attribute:"synopsis", value: "The remote Mac OS X host has an application that allows arbitrary code execution." ); script_set_attribute( attribute:"description", value: "According to its version, the instance of Skype installed on the remote Mac OS X host reportedly allows an attacker to send a specially crafted message to a user on the affected host and execute arbitrary code. Note that by default, such a message would have to come from someone in a user's Skype Contact List." ); # http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6a8cef8d"); # http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c36790c1"); script_set_attribute(attribute:"solution", value:"Upgrade to Skype for Mac 5.1.0.922 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2011/05/06"); script_set_attribute(attribute:"patch_publication_date", value:"2011/04/14"); script_set_attribute(attribute:"plugin_publication_date", value:"2011/05/09"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:skype:skype"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc."); script_dependencies("macosx_skype_installed.nasl"); script_require_keys("MacOSX/Skype/Version"); exit(0); } include("global_settings.inc"); include("misc_func.inc"); version = get_kb_item_or_exit("MacOSX/Skype/Version"); fixed_version = "5.1.0.922"; if ( version =~ "^5\." && ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1 ) { if (report_verbosity > 0) { report = '\n Installed version : ' + version + '\n Fixed version : '+fixed_version+'\n'; security_warning(port:0, extra:report); } else security_warning(0); exit(0); } else exit(0, "Skype for Mac "+version+" is installed and thus not affected.");
References
- http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html
- http://isc.sans.edu/diary.html?storyid=10837
- http://secunia.com/advisories/44522
- http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking
- http://www.securityfocus.com/bid/47747
- http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/
- http://www.vupen.com/english/advisories/2011/1192
- http://blogs.skype.com/security/2011/05/security_vulnerability_in_mac.html
- http://www.vupen.com/english/advisories/2011/1192
- http://www.theregister.co.uk/2011/05/06/skype_for_mac_critical_vulnerability/
- http://www.securityfocus.com/bid/47747
- http://www.purehacking.com/blogs/gordon-maddern/skype-0day-vulnerabilitiy-discovered-by-pure-hacking
- http://secunia.com/advisories/44522
- http://isc.sans.edu/diary.html?storyid=10837