Akamai Download Manager ActiveX Control < Arbitrary File Download

High Nessus Plugin ID 33102


The remote Windows host has an ActiveX control that allows arbitrary file downloads.


The Windows remote host contains the Download Manager ActiveX control from Akamai, which helps users download content.

The version of this ActiveX control on the remote host reportedly is affected by a parameter injection vulnerability that could be exploited to download arbitrary files and place them in arbitrary locations on the affected host, such as the 'Startup' folder used by Windows. If an attacker can trick a user on the affected host into visiting a specially crafted web page, this method could be used to execute arbitrary code on the affected system subject to the user's privileges.


Upgrade to version or later of the control.

See Also



Plugin Details

Severity: High

ID: 33102

File Name: akamai_dlm_activex_2_2_3_7.nasl

Version: $Revision: 1.15 $

Type: local

Agent: windows

Family: Windows

Published: 2008/06/05

Modified: 2016/10/07

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2008-1770

EDB-ID: 5741

Secunia: 30537

OSVDB: 45968

CWE: 94