Vulnerability Details : CVE-2006-2312
Argument injection vulnerability in the URI handler in Skype 2.0.*.104 and 2.5.*.0 through 2.5.*.78 for Windows allows remote authorized attackers to download arbitrary files via a URL that contains certain command-line switches.
Products affected by CVE-2006-2312
- cpe:2.3:a:skype:skype:*:*:*:*:*:*:*:*
- cpe:2.3:a:skype:skype:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-2312
4.38%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-2312
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.6
|
LOW | AV:N/AC:H/Au:N/C:P/I:N/A:N |
4.9
|
2.9
|
NIST |
CWE ids for CVE-2006-2312
-
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.Assigned by: nvd@nist.gov (Primary)
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-2312
-
http://www.skype.com/security/skype-sb-2006-001.html
Uh oh...Broken Link
-
http://www.kb.cert.org/vuls/id/466428
VU#466428 - Skype URI handler fails to properly parse parametersThird Party Advisory;US Government Resource
-
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0549.html
Broken Link
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/26557
Skype URI handler file access CVE-2006-2312 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://www.osvdb.org/25658
404 Not FoundBroken Link
-
http://www.securityfocus.com/bid/18038
Broken Link;Third Party Advisory;VDB Entry
-
http://secunia.com/advisories/20154
About Secunia Research | FlexeraBroken Link;Vendor Advisory
-
http://www.vupen.com/english/advisories/2006/1871
Webmail: access your OVH emails on ovhcloud.com | OVHcloudBroken Link;Vendor Advisory
-
http://www.securityfocus.com/archive/1/434707/30/4860/threaded
Broken Link;Third Party Advisory;VDB Entry
Jump to