S-185: SkypeFind Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-185: SkypeFind Vulnerability
# 1  
Old 02-15-2008
S-185: SkypeFind Vulnerability

The Skype client does not properly filter user-supplied input that was received from the SkypeFind service. This vulnerability may allow an attacker to execute arbitrary code. The risk is MEDIUM. The user-supplied script runs in the Local Machine Zone a remote unauthenticated attacker may be able to exexute arbitrary code.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. IP Networking

Common Vulnerability

Hi there, I am trying to find info about the commonly used ports and how it can be vulnerable and to identify them? For example, I would like to identify how to man-in-the-middle using these ports 21(FTP),22(SSH),23(TELNET), (1 Reply)
Discussion started by: alvinoo
1 Replies

2. News, Links, Events and Announcements

Bash vulnerability

Not sure if there is a post about it here somewhere already. Anyway: Remote exploit vulnerability in bash CVE-2014-6271 | CSO Online (3 Replies)
Discussion started by: zaxxon
3 Replies

3. UNIX for Dummies Questions & Answers

Vulnerability Alerts

Aside from CERT, are there any additional sources for unix/linux vulnerabilities? (1 Reply)
Discussion started by: kmgrady01
1 Replies

4. Cybersecurity

SNMP Vulnerability

SNMP Vulnerability: In a few minutes wire services and other news sources will begin breaking a story about widespread vulnerabilities in SNMP (Simple Network Management Protocol). Exploits of the vulnerability cause systems to fail or to be taken over. The vulnerability can be found in... (1 Reply)
Discussion started by: dpatel
1 Replies
Login or Register to Ask a Question
AMSERVICE(8)						  System Administration Commands					      AMSERVICE(8)

NAME
amservice - run an amanda service on a client SYNOPSIS
amservice [-f input_file [-s]] [-o configoption...] hostname auth service DESCRIPTION
Amservice execute an Amanda service on a client. It can be used without amanda server configuration (amanda.conf and disklist). It can be used to check communication between a server and a client. Amservice reads stdin to capture the REQ packet to send to the client. See the amanda(8) man page for more details about Amanda. OPTIONS
hostname The hostname of the client. auth The auth to use, one of: bsd, bsdudp, bsdtcp, ssh, rsh or krb5. The client must be configured with this auth. service The amanda service to execute on the client. One of noop, selfcheck or sendsize. -f input_file Use the file input_file instead of stdin to read the REQ packet from. -s Redirect the first connected stream to stdin/stdout. The -f argument is required for the REQ packet, the REP packet is not printed on stdout. -o configoption See the "CONFIGURATION OVERRIDE" section in amanda(8). EXAMPLE
The noop service is easy to execute because it does not require a REQ packet: amservice hostname bsdtcp noop < /dev/null The example executes the noop service on the client using bsdtcp auth. This is useful for debugging connection problems. It print an OPTIONS line upon success. It is more difficult to execute the selfcheck or sendsize service, as these require a valid REQ packet. If you have already uccessfully run amanda, you can find valid REQ packets in the amandad.*.debug files. EXIT CODE
The exit code of amservice is one of: 0 = success 1 = error executing amandad on the client. As amservice doesn't parse the REP packet, it can only detect failures in executing amandad on the client. amservice can exit with value 0 even if the user is not authorized to execute the service. An error message will be printed. SEE ALSO
amanda(8), amanda(8), amcheck(8), amdump(8), amadmin(8) The Amanda Wiki: : http://wiki.zmanda.com/ AUTHOR
Jean-Louis Martineau <martineau@zmanda.com> Zmanda, Inc. (http://www.zmanda.com) Amanda 3.3.3 01/10/2013 AMSERVICE(8)