search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Skype URI handler fails to properly parse parameters

Vulnerability Note VU#466428

Original Release Date: 2006-06-06 | Last Revised: 2006-06-07


A remote attacker could potentially retrieve files from Skype users running the Microsoft Windows version of the Skype software.


Skype is an application that allows users to communicate with voice or messaging across the Internet or local area networks. Skype also features the ability for users to transfer files, send SMS messages, and send videos. In some circumstances, a Skype URL can be crafted that, if followed, initiates the transfer of a single named file to another Skype user.

Skype reports that this vulnerability only affects the Windows version of the software.


If a victim user connects to the specially-crafted Skype URL, an attacker could get any file he/she chooses from the victim's computer with the privileges of the user running Skype.


Upgrade to Skype 2.5, release 2.5.*.79 (or later) or Skype 2.0, release 2.0.*.105 (or later). More information can be found in Skype security bulletin SKYPE-SB/2006-001.

Vendor Information

Affected   Unknown   Unaffected

Skype Technologies

Updated:  May 23, 2006



Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Refer to

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A



This vulnerability was reported i n Skype Security Bulletin 2006-001 . Skype, in turn, credits Brett Moore of Security- Ltd . with discovery and reporting of this issue.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-2312
Severity Metric: 0.24
Date Public: 2006-05-18
Date First Published: 2006-06-06
Date Last Updated: 2006-06-07 14:31 UTC
Document Revision: 22

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.