-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                          ESB-2008.0124 -- [Win]
               Skypefind Cross Zone Scripting Vulnerability
                              6 February 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              3.6.0.244 and prior
Publisher:            Skype
Operating System:     Windows
Impact:               Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-0582 CVE-2008-0583

Original Bulletin:    http://skype.com/intl/en/security/skype-sb-2008-002.html

- --------------------------BEGIN INCLUDED TEXT--------------------

SKYPE-SB/2008-002: Skypefind Cross Zone Scripting Vulnerability

   Bulletin title:       Skypefind Cross Zone Scripting Vulnerability
   Bulletin ID:          SKYPE-SB/2008-002
   Bulletin status:      FINAL
   Date of announcement: 2008-01-31 11:00:00 +0000
   Products affected:    Skype for Windows
   Vulnerability type:   Cross Zone Scripting
   CVE references:      
   Risk assessment:      MEDIUM
   CVSS base score:      7.8 (AV:N/AC:M/Au:Mu/C:C/I:C/A:C)
   Cross-references:    
   http://www.skype.com/intl/en/security/skype-sb-2008-001-update1.html
   http://aviv.raffon.net/2008/01/17/SkypeCrosszoneScriptingVulnerability.aspx

Table of contents:

    1. Problem description and brief discussion
    2. Impact and affected software
    3. Solution or work-around
    4. Special instructions and notes
    5. Software download location
    6. Authenticity verification
    7. Common Vulnerability Scoring System (CVSS) assessment
    8. Credits and additional information
    9. Bulletin release history
   10. Notices

1. Problem description and brief discussion

Description

   Skype uses Internet Explorer web control to render HTML content for
   different webapplications, including SkypeFind.

   A vulnerability has been found in the Skypefind which allows attacker
   to execute arbitrary code when victim is navigating to the SkypeFind
   directory item (business contact) which submitted in special way.

   There is one important precondition for the exploit to work: victim
   must receive Skype contact request authorization from the attacker's
   Skype account.

   This vulnerability is exploitable because of security zone elevation
   vulnerability in skype client (see Skype Security Bulletin
   SKYPE-SB/2008-001 and links in Cross References section above) which
   allows scripts to be run in Local Zone security context in IE web
   control used to render SkypeFind content.

2. Impact and affected software

Impact

   A user of Skype for Windows who either a) navigates directly to the
   SkypeFind specially submitted business contact or b) when searching
   for business contacts is presented with result page which includes
   specially submitted business contact may experience execution of
   arbitrary code without consent.

Affected software

3. Solution or work-around

   Skype has fixed the vulnerability in Skypefind

4. Special instructions and notes

   None.

5. Software download location

   The preferred method for installing security updates is to download
   the software directly from Skype's website, from the website of
   Skype's authorized partners, or from a reliable mirror site. Skype may
   also be safely downloaded from other locations, but in this case it is
   particularly important that you verify the authenticity of the
   download.

   We recommend that once you download any Skype software that you verify
   its integrity by the methods listed in Section 6 of this Bulletin.

   x86 platform, Microsoft Windows 2000 or Microsoft Windows XP:
   http://www.skype.com/download/skype/windows/

   x86 platform, Linux: http://www.skype.com/download/skype/linux/

   PPC and x86 platforms, Mac OS X v10.3.9 or later:
   http://www.skype.com/download/skype/macosx/

   Pocket PC platform, Microsoft Windows Mobile 2003:
   http://www.skype.com/download/skype/pocketpc/

6. Authenticity verification

   - Bulletin authenticity verification:

   Skype security bulletins are published on Skype's web site and via
   mailing lists. The authenticity and integrity of a Skype security
   bulletins may be determined by inspecting the crypto- graphic
   signature that is attached to each bulletin. All Skype security
   bulletins are published with a valid digital signature produced by
   PGP.

   - Software authenticity verification:

   Both the Skype installer program and the Skype program that is
   installed by the installer are digitally signed.

   For Skype software built for Microsoft Windows and Mac OSX operating
   environments, the digital certificate used by Skype to sign software
   packages is signed by "VeriSign Class 3 Code Signing 2004 CA".

   For Skype software built for Linux platforms, all packages are signed
   by PGP key ID 0xD66B746E, the public component of which may be
   downloaded from http://www.skype.com/download/skype/linux/.

   - For general information about Skype security, please visit the Skype
   Security Resource Center at http://www.skype.com/security/.

7. Common Vulnerability Assessment System (CVSS) assessment

   Skype has rated the issue covered by this Security Bulletin under the
   CVSS scheme as follows:

   Base metrics as of 2008-01-31:

   Access Vector (AV) ........... Network
   Access Complexity (AC) ....... Medium
   Authentication (Au) .....,.... Multiple
   Confidentiality Impact (C) ... Complete
   Integrity Impact (I) ......... Complete
   Availability Impact (A) ...... Complete

   Computed CVSS base score: 7.8

   Temporal metrics as of 2008-01-31

   Exploitability (E) ........... proof-of-concept
   Remediation Level (RL) ....... official-fix
   Report Confidence (RC) ....... confirmed

   Computed CVSS temporal score: 6.1

   Skype participates in the CVSS by rating each identifiable security
   vulnerability against the CVSS base metrics. In addition, Skype may
   rate each vulnerability against temporal metrics from time to time. As
   suggested by the name, temporal metrics for a particular vulnerability
   may change from time to time.

   More information about the CVSS may be obtained from the CVSS host
   website at http://www.first.org/cvss/.

8. Credits and additional information

   Skype would like to thank Aviv Raff for having referred this problem
   to Skype in timely manner.

9. Bulletin release history

   2008-01-31 Initial bulletin release

10. Notices

   Copyright 2008 Skype Technologies, S.A. All rights reserved.

   This Skype Security Bulletin may be reproduced and distributed,
   provided that the Bulletin is not modified in any way and is
   attributed to Skype Technologies, S.A. and provided that repro-
   duction and distribution is performed for non-commercial purposes.

   This Skype Security Bulltin is provided to you on an "AS IS" basis and
   may contain information provided by third parties. Skype makes no
   guarantees or warranties as to the information contained herein. ANY
   AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
   WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
   NON-INFRINGEMENT, ARE HEREBY DISCLAIMED.

   To report a security issue to Skype, please send an e-mail that
   describes the problem or vulnerability to security@skype.com.
   Please consider securing any reports that disclose security
   vulnerabilities by encrypting them using the current PGP key of the
   Skype Computer Emergency Response Team (SKY-CERT), PGP key ID
   0xAD2DF320.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBR6lG7yh9+71yA2DNAQLCSwP/VhAwG9fQ9PQrS95boINOCR9AgUcLdE1r
xvCb/q2/0u40XApT2OuWoVuDIZ9ipWljReYZ5RD9D/NhLo25fzFBsUG//8jMQicA
yZiV7qi4ctPWDs3n2dzEcR+sr2to5GscmAwE8StLaOKuN4ZZVaFFVyC38qqdi3Vm
GpP2aSfGZM4=
=qCEe
-----END PGP SIGNATURE-----