Akamai Download Manager ActiveX Control < 2.2.3.6 Arbitrary File Download

high Nessus Plugin ID 33102

Synopsis

The remote Windows host has an ActiveX control that allows arbitrary file downloads.

Description

The Windows remote host contains the Download Manager ActiveX control from Akamai, which helps users download content.

The version of this ActiveX control on the remote host reportedly is affected by a parameter injection vulnerability that could be exploited to download arbitrary files and place them in arbitrary locations on the affected host, such as the 'Startup' folder used by Windows. If an attacker can trick a user on the affected host into visiting a specially crafted web page, this method could be used to execute arbitrary code on the affected system subject to the user's privileges.

Solution

Upgrade to version 2.2.3.7 or later of the control.

See Also

https://seclists.org/fulldisclosure/2008/Jun/59

https://www.securityfocus.com/archive/1/493077/30/0/threaded

Plugin Details

Severity: High

ID: 33102

File Name: akamai_dlm_activex_2_2_3_7.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 6/5/2008

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2008-1770

CWE: 94

SECUNIA: 30537