Akamai Download Manager ActiveX Control < Remote Code Execution

High Nessus Plugin ID 32082


The remote Windows host has an ActiveX control that allows remote code execution.


The Windows remote host contains the Download Manager ActiveX control from Akamai, which helps users download content.

The version of this ActiveX control on the remote host reportedly allows downloading and automatic execution of arbitrary code. If an attacker can trick a user on the affected host into visiting a specially crafted web page, this method could be leveraged to execute arbitrary code on the affected system subject to the user's privileges.


Upgrade to version or later of the control.

See Also




Plugin Details

Severity: High

ID: 32082

File Name: akamai_dlm_activex_2_2_3_5.nasl

Version: $Revision: 1.17 $

Type: local

Agent: windows

Family: Windows

Published: 2008/05/01

Modified: 2016/10/07

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

CANVAS (D2ExploitPack)

Reference Information

CVE: CVE-2007-6339

BID: 28993

OSVDB: 44882

Secunia: 30037

CWE: 94