Feeds

Skype blocks poison movie peril

Video pwnd the radio star

Internet Security Threat Report 2014

Skype said it has blocked a bug that created a means for hackers to attack vulnerable Windows PCs using malicious video files.

The cross-zone scripting vulnerability involves the interaction between Skype and video-sharing sites such as DailyMotion, which allows users to download video clips and add them to their Skype VoIP client. The vulnerability had the potential to affect users of Skype 3.5 and 3.6 for Windows who used Skype’s video gallery to access booby-trapped DailyMotion videos.

The flaw, said to affect online video site MetaCafe as well as DailyMotion, came to light in a post by security researcher Miroslav Lucinskij to a full-disclosure mailing list on Thursday. For example, the security bug makes it possible to inject a malicious script to the "Add video to chat" dialogue using the title field of DailyMotion movie clips.

"This means that an attacker can now upload a movie, set a kewl popular keyword (e.g. 'Paris Hilton'), and own any user that will search for a video with those keywords through Skype," explains Israeli security researcher Aviv Raff, who has published a harmless proof-of-concept demo to illustrate concern about the bug.

Raff blames a poor security architecture in how Skype hooks into Internet Explorer for the vulnerability. Skype uses Internet Explorer web control within the application to render internal and external HTML pages.

Skype is running these web controls in Local Zone and, worse, accessing HTML pages in an unlocked Local Zone mode, Raff explained.

Other security researchers agreed with Raff that the bug opens the door up to all sorts of mischief. "The attack vector is a bit convoluted, but very much possible and quite practical," said Petko Petkov, a UK-based penetration tester. "The most obvious approaches would be to either social engineer the user or spam DailyMotion with hundreds of infected movies that correspond to popular keywords."

The eBay VoIP subsidiary said that the vulnerability was "neutralized before attackers took advantage of it". Skype said on Friday that it has temporarily disabled users' ability to add videos from the DailyMotion gallery until an official fix has been made available. In turn, DailyMotion is addressing the vulnerability on their website, it added. A security advisory from Skype on the vulnerability can be found here.

Petkov criticised Skype's security architecture more generally. He suggested that unencrypted data within Skype's ads created a means for hackers to taint ad traffic with malware by using packet injection tools such as Airpwn in environments such as public wireless hotspots. Skype is yet to respond to our request for comment on this by tapas time. ®

Remote control for virtualized desktops

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.