Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Skype this week has prompted Mac users to install an update that kills a zero-day vulnerability.
Pure Hacking researcher Gordon Maddern stumbled on the flaw last month.
The bug could have enabled an attacker to take control of a victim's computer simply by sending a malicious message.
"About a month ago I was chatting on Skype to a colleague about a payload for one of our clients," Maddern wrote in a blog post.
"Completely by accident, my payload executed in my colleague's Skype client...The long and the short of it is that an attacker needs only to send a victim a message and they can gain remote control of the victim's Mac. It is extremely wormable and dangerous."
Maddern said he used the open-source Metasploit framework to craft a proof-of-concept, then notified Skype about the vulnerability. But it never was fixed.
The flaw was remediated 14 April when Skype issued a hotfix for version 220.127.116.112 for Mac, however, Skype did not prompt its users to install the update because there were no reports of active exploits.
Skype chief security officer Adrian Asher downplayed the risk of the bug. He said the worm would have had difficulty spreading because Skype is set up in a such a way that it does not permit users to receive messages from people with whom they have not approved.
Users are now being asked to manually install the update that began circulating Monday, 18.104.22.1685, Asher said. Clients for Windows and Linux are not affected by the vulnerability.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.