Microsoft Skype 7.16.0.102 contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system. This vulnerability exists due to the way .dll files are loaded by Skype. It allows an attacker to load a .dll of the attacker's choosing that could execute arbitrary code without the user's knowledge.The specific flaw exists within the handling of DLL (api-ms-win-core-winrt-string-l1-1-0.dll) loading by the Skype.exe process.
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2017/Mar/44 | third party advisory mailing list |
https://twitter.com/tiger_tigerboy/status/755332687141883904 | press/media coverage |
https://twitter.com/vysecurity/status/845013670103003138 | press/media coverage |
http://www.securityfocus.com/bid/96969 | vdb entry third party advisory |
http://www.securitytracker.com/id/1038209 | vdb entry |
https://technet.microsoft.com/security/cc308575.aspx | not applicable |
http://packetstormsecurity.com/files/141650/Skype-7.16.0.102-DLL-Hijacking.html | us government resource exploit third party advisory |