Re: Skype exploitable vulnerabilities and risks pointers



On Wed, 12 Jul 2006, Serge Vondandamo wrote:

Hi,

Serge,

I am conducting a research for exploitable vulnerabilities in Skype and
their associated risks to corporate environments.

Any Security concern and how to mitigate them if possible. Skype
engineers, your constructive inputs are welcome.

Does anybody have some good references, mailing lists, urls or papers
regarding Skype?

An interesting starting point for your research (already mentioned in the
recent "How to pentest Skype?" pen-test mailing list thread, together with
some other interesting material -- you should take a look at the archives
for further information) is:

http://www1.cs.columbia.edu/~salman/skype/

And, of course, Google/CVE/OSVDB/SecurityFocus/etc. are your friends:

http://www.google.com/search?q=skype+security
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=skype
http://search.securityfocus.com/swsearch?sbm=%2F&metaname=alldoc&query=skype
http://www.osvdb.org/searchdb.php?action=search_title&vuln_title=skype

[...]

Hope this helps,

--
Marco Ivaldi
Antifork Research, Inc. http://0xdeadbeef.info/
3B05 C9C5 A2DE C3D7 4233 0394 EF85 2008 DBFD B707


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@xxxxxxxxxx for details.
------------------------------------------------------------------------------