Akamai Download Manager ActiveX Control < 2.2.3.5 Remote Code Execution

high Nessus Plugin ID 32082

Synopsis

The remote Windows host has an ActiveX control that allows remote code execution.

Description

The Windows remote host contains the Download Manager ActiveX control from Akamai, which helps users download content.

The version of this ActiveX control on the remote host reportedly allows downloading and automatic execution of arbitrary code. If an attacker can trick a user on the affected host into visiting a specially crafted web page, this method could be leveraged to execute arbitrary code on the affected system subject to the user's privileges.

Solution

Upgrade to version 2.2.3.5 or later of the control.

See Also

http://www.nessus.org/u?3f59bfc9

https://seclists.org/bugtraq/2008/May/1

https://seclists.org/fulldisclosure/2008/Apr/816

Plugin Details

Severity: High

ID: 32082

File Name: akamai_dlm_activex_2_2_3_5.nasl

Version: 1.20

Type: local

Agent: windows

Family: Windows

Published: 5/1/2008

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

CANVAS (D2ExploitPack)

Reference Information

CVE: CVE-2007-6339

BID: 28993

CWE: 94

SECUNIA: 30037