{"vuid":"VU#466428","idnumber":"466428","name":"Skype URI handler fails to properly parse parameters","keywords":["Skype","URI handler","information disclosure","send file","parse parameters"],"overview":"A remote attacker could potentially retrieve files from Skype users running the Microsoft Windows version of the Skype software.","clean_desc":"Skype is an application that allows users to communicate with voice or messaging across the Internet or local area networks. Skype also features the ability for users to transfer files, send SMS messages, and send videos. In some circumstances, a Skype URL can be crafted that, if followed, initiates the transfer of a single named file to another Skype user. Skype reports that this vulnerability only affects the Windows version of the software.","impact":"If a victim user connects to the specially crafted Skype URL, an attacker could get any file he/she chooses from the victim's computer with the privileges of the user running Skype.","resolution":"Upgrade to Skype 2.5, release 2.5.*.79 (or later) or Skype 2.0, release 2.0.*.105 (or later). More information can be found in Skype security bulletin SKYPE-SB/2006-001.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported i\nn \nSkype Security Bulletin 2006-001\n. Skype, in turn, credits Brett Moore \nof Security- Assessment.com Ltd\n. with discovery and reporting of this issue.","author":"This document was written by Ryan Giobbi.","public":["http://secunia.com/advisories/20154/","http://www.skype.com/security/skype-sb-2006-001.html"],"cveids":["CVE-2006-2312"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-05-19T13:54:46Z","publicdate":"2006-05-18T00:00:00Z","datefirstpublished":"2006-06-06T20:09:06Z","dateupdated":"2006-06-07T14:31:34Z","revision":24,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"1","cam_population":"12","cam_impact":"11","cam_easeofexploitation":"2","cam_attackeraccessrequired":"3","cam_scorecurrent":"0.2376","cam_scorecurrentwidelyknown":"0.31185","cam_scorecurrentwidelyknownexploited":"0.60885","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.2376,"vulnote":null}