{"api_version":"1","generated_at":"2026-04-28T07:05:59+00:00","cve":"CVE-2017-6517","urls":{"html":"https://cve.report/CVE-2017-6517","api":"https://cve.report/api/cve/CVE-2017-6517.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-6517","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-6517"},"summary":{"title":"CVE-2017-6517","description":"Microsoft Skype 7.16.0.102 contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system. This vulnerability exists due to the way .dll files are loaded by Skype. It allows an attacker to load a .dll of the attacker's choosing that could execute arbitrary code without the user's knowledge.The specific flaw exists within the handling of DLL (api-ms-win-core-winrt-string-l1-1-0.dll) loading by the Skype.exe process.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2017-03-23 20:59:00","updated_at":"2019-10-03 00:03:00"},"problem_types":["CWE-427"],"metrics":[],"references":[{"url":"https://twitter.com/tiger_tigerboy/status/755332687141883904","name":"https://twitter.com/tiger_tigerboy/status/755332687141883904","refsource":"MISC","tags":["Press/Media Coverage"],"title":"Sachin Wagh na Twitterze: \"One more Hit. Finally Microsoft. Listed in Microsoft Hall of Fame (June 2016 Security Researchers).… \"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1038209","name":"1038209","refsource":"SECTRACK","tags":[],"title":"Microsoft Skype Library Loading Bug Lets Remote Users Execute Arbitrary Code on the Target System in Certain Cases - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2017/Mar/44","name":"20170316 Skype Insecure Library Loading Vulnerability (api-ms-win-core-winrt-string-l1-1-0.dll)","refsource":"FULLDISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: Skype Insecure Library Loading Vulnerability\t(api-ms-win-core-winrt-string-l1-1-0.dll)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://twitter.com/vysecurity/status/845013670103003138","name":"https://twitter.com/vysecurity/status/845013670103003138","refsource":"MISC","tags":["Press/Media Coverage"],"title":"Vincent Yiu on Twitter: \"@CVEnew Totes \"hi can you put this dll in your Skype folder and run skype?\"\"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/96969","name":"96969","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Skype CVE-2017-6517 DLL Loading Local Code Execution Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://technet.microsoft.com/security/cc308575.aspx","name":"https://technet.microsoft.com/security/cc308575.aspx","refsource":"CONFIRM","tags":["Not Applicable"],"title":"Security Researcher Acknowledgments for Microsoft Online Services - Prior Months","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/141650/Skype-7.16.0.102-DLL-Hijacking.html","name":"http://packetstormsecurity.com/files/141650/Skype-7.16.0.102-DLL-Hijacking.html","refsource":"MISC","tags":["Exploit","Third Party Advisory","US Government Resource"],"title":"Skype 7.16.0.102 DLL Hijacking ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-6517","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6517","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"6517","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"skype","cpe6":"7.16.0.102","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6517","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"skype","cpe6":"7.16.0.102","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2017-6517","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Microsoft Skype 7.16.0.102 contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system. This vulnerability exists due to the way .dll files are loaded by Skype. It allows an attacker to load a .dll of the attacker's choosing that could execute arbitrary code without the user's knowledge.The specific flaw exists within the handling of DLL (api-ms-win-core-winrt-string-l1-1-0.dll) loading by the Skype.exe process."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20170316 Skype Insecure Library Loading Vulnerability (api-ms-win-core-winrt-string-l1-1-0.dll)","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2017/Mar/44"},{"name":"https://twitter.com/tiger_tigerboy/status/755332687141883904","refsource":"MISC","url":"https://twitter.com/tiger_tigerboy/status/755332687141883904"},{"name":"https://twitter.com/vysecurity/status/845013670103003138","refsource":"MISC","url":"https://twitter.com/vysecurity/status/845013670103003138"},{"name":"96969","refsource":"BID","url":"http://www.securityfocus.com/bid/96969"},{"name":"1038209","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1038209"},{"name":"https://technet.microsoft.com/security/cc308575.aspx","refsource":"CONFIRM","url":"https://technet.microsoft.com/security/cc308575.aspx"},{"name":"http://packetstormsecurity.com/files/141650/Skype-7.16.0.102-DLL-Hijacking.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/141650/Skype-7.16.0.102-DLL-Hijacking.html"}]}},"nvd":{"publishedDate":"2017-03-23 20:59:00","lastModifiedDate":"2019-10-03 00:03:00","problem_types":["CWE-427"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:microsoft:skype:7.16.0.102:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"6517","Ordinal":"103204","Title":"CVE-2017-6517","CVE":"CVE-2017-6517","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"6517","Ordinal":"1","NoteData":"Microsoft Skype 7.16.0.102 contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system. This vulnerability exists due to the way .dll files are loaded by Skype. It allows an attacker to load a .dll of the attacker's choosing that could execute arbitrary code without the user's knowledge.The specific flaw exists within the handling of DLL (api-ms-win-core-winrt-string-l1-1-0.dll) loading by the Skype.exe process.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"6517","Ordinal":"2","NoteData":"2017-03-23","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"6517","Ordinal":"3","NoteData":"2017-07-10","Type":"Other","Title":"Modified"}]}}}