what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ATSA-2007-001.txt

ATSA-2007-001.txt
Posted Apr 17, 2007
Authored by iDefense, FortiNet | Site akamai.com

Akamai Technologies Security Advisory 2007-0001 - Two security vulnerabilities have been discovered in the ActiveX version of Akamai Download Manager. For successful exploitation, both vulnerabilities require the user to visit a malicious URL, triggering a stack-based buffer overflow that allows the attacker to execute arbitrary code within the context of the victim.

tags | advisory, overflow, arbitrary, vulnerability, activex
advisories | CVE-2007-1891, CVE-2007-1892
SHA-256 | dbbaf096163cf2efc8265445fa804f02abd06396737956dba892bb7bf7981d35

ATSA-2007-001.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------
Akamai Technologies Security Advisory 2007-0001


* Akamai ID: 2007-0001
* Date: 2007/04/16
* Product Name: Download Manager
* Affected Versions: < 2.2.1.0
* Fixed Version: 2.2.1.0
* CVE IDs: CVE-2007-1891 CVE-2007-1892
* CVSS Base Score: (AV:R/AC:H/Au:NR/C:C/I:C/A:C/B:N) 8.0

* Product Description:

Akamai Download Manager is a client software application that helps
users download content easily, quickly, and reliably. It is available
as an ActiveX component or Java applet and provides users the ability
to pause, resume downloading at a later time, and automatically
recover from dropped connections or system crashes.


* Vulnerability Description:

Two security vulnerabilities have been discovered in the ActiveX
version of Akamai Download Manager. For successful exploitation, both
vulnerabilities require the user to visit a malicious URL, triggering
a stack-based buffer overflow that allows the attacker to execute
arbitrary code within the context of the victim.

Vulnerability CVE-2007-1891 affects versions newer than 2.0.4.4 and
older than 2.2.1.0. Vulnerability CVE-2007-1892 affects all versions
prior to 2.2.1.0. Both are remediated by installing version 2.2.1.0
and upgrading to this version is recommended.

The Java version of Akamai Download Manager is not affected by either
of these vulnerabilities.

These vulnerabilities exist only in the Download Manager client
software and do not affect Akamai's services in any way.


* Patch Instructions:

Affected users can upgrade to the latest version of Akamai Download
Manager by visiting the following web page:

http://dlm.tools.akamai.com/tools/upgrade.html

Visiting that page or any other Download Manager enabled page will
prompt the user to install the latest version of the software
automatically. Akamai has successfully coordinated with each of our
enterprise customers to ensure that all are distributing the patched
version.

To verify the correct version is installed:

1) In Internet Explorer, choose "Internet Options..." from the
"Tools" menu.

2) Under the "General" tab, select "Settings..." from the "Temporary
Internet files" section.

3) Select "View Objects..." from the "Temporary Internet files
folder" section.

4) Find the item for "DownloadManager Control" and verify that the
version is "2,2,1,0" or higher.

* If you wish to uninstall Download Manager, complete this last step:

5) Find the item for "DownloadManager Control", right-click and
select "Remove".

6) When prompted to confirm, choose "Yes".



* Credit:

CVE-2007-1891 was independently discovered and brought to Akamai's
attention by both:

Fortinet (http://www.fortinet.com/)
iDefense (http://labs.idefense.com/)

CVE-2007-1892 was discovered by Akamai.


* Additional Information:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1891
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1892


* About Akamai:

Akamai® is the leading global service provider for accelerating
content and business processes online. Thousands of organizations have
formed trusted relationships with Akamai, improving their revenue and
reducing costs by maximizing the performance of their online
businesses. Leveraging the Akamai EdgePlatform, these organizations
gain business advantage today, and have the foundation for the
emerging Web solutions of tomorrow. Akamai is "The Trusted Choice for
Online Business." For more information, visit www.akamai.com.

- ----------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
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=sQgi
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close