A new version of the popular Skype VOIP application has been released to correct a bug that caused Skype to be misread as a potential security threat.
The Skype 2.0.0.73 for Windows update fixes a flaw that triggered a DEP (Data Execution Protection) warning on systems running Windows XP SP2 with DEP-enabled Intel or AMD processors.
DEP is a set of hardware and software technologies that perform additional checks on memory to help prevent buffer overflow attacks.
The Skype bug meant that users running new computers had to manually configure the application as an exception to turn off the DEP warnings.
This, however, created a scenario where users were being lulled into ignoring DEP warnings because of the Skype bug.
“Until now, Skype always crashed with DEP, even though there was nothing bad in it—it was simply a bug in Skype thats now squashed,” the eBay-owned company said in a notice accompanying the software upgrade.
“If you added Skype to some DEP exception list before this release, feel free to upgrade to 2.0.0.73 and then remove it from the exceptions list,” the company said.
Cisco Patches DoS Vulnerabilities
Routing and switching giant Cisco System has shipped three separate security alerts to notify users of denial-of-service vulnerabilities in multiple products.
The first advisory deals with three separate bugs in Cisco Call Manager, the software-based call-processing component of the Cisco IP telephony service.
The company said the problem occurs because all Cisco CallManager versions do not manage TCP connections and Windows messages aggressively, leaving some well-known, published ports vulnerable to denial-of-service attacks.
Cisco also warned of a separate CallManager vulnerability that can be exploited by malicious users to gain escalated privileges.
The flaw is caused due to an error in the CCMAdmin Web page and can be exploited by administrative users with read-only privileges to gain full administrative access via a specially crafted URL.
Successful exploitation requires that MLA (Multi Level Administration) is enabled.
The third advisory included patches for a Cisco IOS flaw that could cause denial-of-service conditions.
The vulnerability is caused due to an error in the handling of the SGBP (Stack Group Bidding) protocol.
The company warned that the flaw could be exploited to cause a vulnerable device to become unresponsive and trigger a hardware reset by sending a specially crafted UDP datagram to port 9900.
The vulnerability affects all Cisco products running the Cisco IOS software and has enabled support for the SGBP protocol.
FreeBSD Vulnerable to WiFi Flaw
The open-source FreeBSD Project has shipped an update to patch a potentially serious flaw in the way the IEEE 802.11 wireless protocol is implemented.
In an advisory, the flaw is described as an integer overflow error in the “net80211” module when handling corrupt IEEE 802.11 beacons or probe response frames during scanning for existing wireless networks.
This can result in a buffer overflow and may allow execution of arbitrary code on a vulnerable system scanning for wireless networks.