Hi,

On Wed, 10 Sep 2014 07:50:05 +0200 J. Roeleveld wrote:
> > I'm talking about the following research:
> > https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact
> > =8&ved=0CB4QFjAA&url=https%3A%2F%2Fwww.blackhat.com%2Fpresentations%2Fbh-eur
> > ope-06%2Fbh-eu-06-biondi%2Fbh-eu-06-biondi-up.pdf&ei=9jAPVJH1AafnygOOiIHgDg&
> > usg=AFQjCNHeILDYY4k-nUUw8vPmUCJ86Eywbg&bvm=bv.74649129,d.bGQ
> > 
> > Of course, skype protocol was likely changed since that time, but I
> > really doubt that functionality for remote execution of arbitrary
> > code was removed.
> 
> That research was from 2006. Over 8 years ago.
> Do you avoid using Bind because of all the security bugs it had in 2006?
> What about OpenSSL, that one had a big one not too long ago.
> And I'm sure I can find plenty of exploits for the Linux kernel based on the 
> versions in use in 2006.
> 
> The Skype protocol has changed a lot over the years and older versions of the 
> protocol have been deprecated and removed.

There is a large difference between mistake, bug and deliberately
added functionality. As research shows, remote code execution was
deliberately added. What was a bug is a mistake that allowed
third-party to use this feature without proper keys.
 
> If it is still in there, I'm certain it would be known, considering the 
> amount 
> of people using Skype these days.

Ablosute majority of these people are not IT specialists and even
for those that are, skype is extremely hard to decrypt, diassemble
and study, as one can see from the work above. Most probably that
nobody cares to spend several months of full-time employment to
analyze modern skype versions again.


Best regards,
Andrew Savchenko

Attachment: pgpX4weNr1fq4.pgp
Description: PGP signature

Reply via email to