exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Skype Client For Mac Chat Unicode Denial Of Service

Skype Client For Mac Chat Unicode Denial Of Service
Posted Jun 23, 2010
Authored by Marc Ruef | Site scip.ch

The Skype client for Mac Chat suffers from a unicode related denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | f948952222defade88deecce448672cc4c9753535691afb7597dc9381db5ac14

Skype Client For Mac Chat Unicode Denial Of Service

Change Mirror Download
Skype Client for Mac Chat Unicode Denial of Service

scip AG Vulnerability ID 4142 (06/22/2010)
https://www.scip.ch/?vuldb.4142

I. INTRODUCTION

Skype is a very popular proprietary voice-over-ip client available for
multiple platforms.

More information is available on the official web site at the following URL:

https://www.skype.com

II. DESCRIPTION

Marc Ruef at scip AG found a denial of service vulnerability in the
current release for Apple MacOS X (version 2.8).

The application provides the possibility of sending messages to other
Skype users via the embedded chat feature.

If a vulnerable client receives a malicious message, the message and all
further messages will be received but not displayed.

It was not possible to reproduce this behavior on different version of
the Skype client for Windows. On the iPhone (Version 1.3.0.275 on iPhone
3gs) the behavior is different. A received message containing the
malicious string is shown but the content not displayed. Instead the
message box contains the hint that the message has been deleted. No
further impact could be determined.

III. EXPLOITATION

Information on how to exploit this vulnerability is included in the
initial bug report.

An attacker has to include Unicode characters in the text message sent
to the victim. The characters used for the proof-of-concept are out of
Mathematical Alphanumeric Symbols (1D400-1D7FF)

An automated toolkit to exploit this vulnerability is available but has
not been disclosed so far.

IV. IMPACT

After receiving a malicious message the attacked client is not able to
use the chat feature anymore.

Furthermore, the handling of some other elements of the application are
not possible anymore (e.g. review the chat history).

V. DETECTION

For a common environment the identification of the attack is possible
after a successful exploitation only.

Deep inspection of received data communication over the Skype channel
may be able to determine an ongoing attack attempt.

VI. SOLUTION

No workaround or solution known at the moment.

It is suggested to allow incoming chat messages from approved friends only.

VII. VENDOR RESPONSE

This issue has been posted on Jira the public issue tracking and
reporting system of Skype.

The vendor verified the existence of the issue. No further information
about bugfixing were published.

VIII. SOURCES

scip AG - Security is our Business (german)
https://www.scip.ch/

scip AG - Vulnerability Database (german)
https://www.scip.ch/?vuldb.4142

computec.ch Document Database (german)
https://www.computec.ch

Skype Jira - Original Bug Report
https://developer.skype.com/jira/browse/SCM-681

IX. DISCLOSURE TIMELINE

2010/05/09 Identification of the vulnerability
2010/05/10 Notification of Skype via Jira (bug tracking)
2010/05/11 Acknowledgement of the issue via Jira
2010/05/11 Providing step-by-step exploit procedure
2010/06/22 Public disclosure of the advisory

X. CREDITS

The vulnerability has been discovered by Marc Ruef.

Marc Ruef, scip AG, Zuerich, Switzerland
maru-at-scip.ch
https://www.scip.ch

Additional testing and help was provided by Stefan Friedli and Martin Burke.

A1. LEGAL NOTICES

Copyright (c) 2002-2010 scip AG, Switzerland.

Permission is granted for the re-distribution of this alert. It may not
be edited in any way without permission of scip AG.

The information in the advisory is believed to be accurate at the time
of publishing based on currently available information. There are no
warranties with regard to this information. Neither the author nor the
publisher accepts any liability for any direct, indirect or
consequential loss or damage from use of or reliance on this advisory.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close