search menu icon-carat-right cmu-wordmark

CERT Coordination Center

SkypeFind fails to properly sanitize user-supplied input

Vulnerability Note VU#794236

Original Release Date: 2008-02-13 | Last Revised: 2008-02-13


The Skype client does not properly filter user-supplied input that was received from the SkypeFind service. This vulnerability may allow an attacker to execute arbitrary code.


Skype is a peer-to-peer application that provides Voice over IP (VoIP) and Instant Messaging services. The Skype client is available for the Microsoft Windows, Apple OS X and Linux operating systems. SkypeFind allows users to review businesses. These reviews are viewable by others.

Skype does not properly filter input that was supplied to the SkypeFind full name field. An attacker may be able to exploit this vulnerability by injecting script into the full name field. When a user viewed the specially crafted SkypeFind profile, the script would be run in the Internet Explorer Local Machine Zone.


As explained in VU#248184, since the user-supplied script runs in the Local Machine Zone a remote unauthenticated attacker may be able to execute arbitrary code.


Skype has addressed this issue by filtering input supplied to the SkypeFind service.

Restrict access to the Skype URI

Blocking the skype: URI handler by using proxy servers or application firewalls may prevent some remote vulnerabilities in Skype from being exploited without user interaction.

Vendor Information


Skype Technologies Affected

Updated:  February 06, 2008



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector



This vulnerability was made public by Aviv Raff.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2008-0582, CVE-2008-0583
Date Public: 2008-01-31
Date First Published: 2008-02-13
Date Last Updated: 2008-02-13 16:40 UTC
Document Revision: 38

Sponsored by CISA.