Skype Technologies Skype URI Handling Remote File Download Vulnerability

BID:18038

CVE-2006-2312 |

Info

Skype Technologies Skype URI Handling Remote File Download Vulnerability

Bugtraq ID: 18038
Class: Input Validation Error
CVE: CVE-2006-2312
Remote: Yes
Local: No
Published: May 19 2006 12:00AM
Updated: May 23 2006 07:38PM
Credit: The vendor credits Brett Moore of Security-Assessment.com Ltd for discovering this issue.
Vulnerable: Skype Technologies Skype 2.5 .78
Skype Technologies Skype 2.0 .104
Skype Technologies Skype 1.4 .0.83
Skype Technologies Skype 1.1 .0.0
Skype Technologies Skype 1.0 .0.97
Skype Technologies Skype 1.0 .0.94
Skype Technologies Skype 1.0 .0.9
Skype Technologies Skype 1.0 .0.29
Skype Technologies Skype 1.0 .0.18
Skype Technologies Skype 1.0 .0.100
Skype Technologies Skype 1.0 .0.10
Skype Technologies Skype 2.5
Skype Technologies Skype 2.0
Skype Technologies Skype 0.98.0.04
Skype Technologies Skype
Not Vulnerable: Skype Technologies Skype 2.5 .79
Skype Technologies Skype 2.0 .105

Discussion

Skype Technologies Skype URI Handling Remote File Download Vulnerability

Skype is prone to an arbitrary file-download vulnerability. This issue is due to improper Skype URI handling.

This issue allows remote attackers to transfer files from one Skype user to another, provided the recipient user has previously approved downloads.

By exploiting this issue, attackers may retrieve an arbitrary file from the victim user's computer.

The following versions of Skype for Windows are vulnerable to this issue:

- prior to 2.0.*.104
- 2.5.*.0 through 2.5.*.78.

Exploit / POC

Skype Technologies Skype URI Handling Remote File Download Vulnerability

Attackers likely use the Skype application and/or a web browser to exploit this issue.

Solution / Fix

Skype Technologies Skype URI Handling Remote File Download Vulnerability

Solution:
The vendor has released an advisory along with fixes to address this issue. Please see the referenced advisory for further information.

References

Skype Technologies Skype URI Handling Remote File Download Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report