lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 22 Jul 2009 17:07:14 -0400 From: Akamai Security Team <security@...mai.com> To: full-disclosure@...ts.grok.org.uk Subject: Akamai Technologies Security Advisory 2009-0001 (Download Manager) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Akamai Technologies Security Advisory 2009-0001 * Akamai ID: 2009-0001 * Date: 07/22/2009 * Product Name: Download Manager * Affected Versions: < 2.2.4.8 * Fixed Version: 2.2.4.8 * CVE IDs: {TBD} * CVSS Base Score: (AV:R/AC:H/Au:NR/C:C/I:C/A:C/B:N) 8.0 * Product Description: Akamai Download Manager is a client software application that helps users download content easily, quickly, and reliably. It is available as an ActiveX component or Java applet and provides users the ability to pause, resume downloading at a later time, and automatically recover from dropped connections or system crashes. * Vulnerability Description: Akamai has become aware of a security vulnerability within the Akamai Download Manager up to and including version 2.2.3.7 of the ActiveX control. For successful exploitation, this vulnerability requires a user to be convinced to visit a malicious URL put into place by an attacker. This may then lead to an unauthorized download and automatic execution of arbitrary code run within the context of the victim user. This vulnerability exist only in the Download Manager client software and does not affect Akamai's services in any way. * Patch Instructions: For ActiveX versions: Affected users can upgrade to the latest version of Akamai Download Manager by visiting the following web page: http://dlm.tools.akamai.com/tools/upgrade.html Visiting that page or any other Download Manager enabled page will prompt the user to install the latest version of the software automatically. Akamai has successfully coordinated with each of our enterprise customers to ensure that all are distributing the patched version. To verify the correct version is installed: 1) In Internet Explorer, choose "Internet Options..." from the "Tools" menu. 2) Under the "General" tab, select "Settings..." from the "Temporary Internet files" section. 3) Select "View Objects..." from the "Temporary Internet files folder" section. 4) Find the item for "DownloadManager Control" and verify that the version is "2,2,4,8" or higher. * If you wish to uninstall Download Manager, complete this last step: 5) Find the item for "DownloadManager Control", right-click and select "Remove". 6) When prompted to confirm, choose "Yes". For Java versions: The java version is not persistently installed. No action is required by the user. * Credit: This vulnerability was independently discovered and brought to Akamai's attention by iDefense (http://labs.idefense.com). * Additional Information: http://www.akamai.com/html/support/security.html * About Akamai: AkamaiĀ® is the leading global service provider for accelerating content and business processes online. Thousands of organizations have formed trusted relationships with Akamai, improving their revenue and reducing costs by maximizing the performance of their online businesses. Leveraging the Akamai EdgePlatform, these organizations gain business advantage today, and have the foundation for the emerging Web solutions of tomorrow. Akamai is "The Trusted Choice for Online Business." For more information, visit www.akamai.com. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (Darwin) iQIcBAEBAgAGBQJKZ3+CAAoJEEngXEVbkoPOzBQP/i8pOYSa3d5kvjDsTAkw9poy NDxuwccggvh2d8T8FFSeET52giBzy+NtXOibuZKovgqha602bd18EVELUcdfQtyS 2tUza9o7ChGqPztmvbeeYCsL2gFCvHN6Rri9f0roRGD2Oilgs3w95gd9Xse7lZ/W xbB/h/y9tU7giqPoEJTSmTKCQp6HUvThjddUDMC7Li/yKIPqwx1kcnlmuwnw8dqG yzYm5o9BIrxG0cC/3a7vw48asikiIVROe4emrvtdJDtjd86q/kqvyXy9VEdw5ZO4 UdptSaoW0V0wvrFbddeqofseuZ5lkoKM9iMheijiXiW+5X7rLlAf44pSCzkIWJ/D up35ht/1W2y3Zk7p1oF7WW5T+rzMSg/GZi8iyKpJk+C794pkBtIbnPDMASvks0Fq JE7HlmLTscq5BYyb+U3Vhga8X6jVWl3hig75rKdueXBFh4x4c2/ADOKb0EVgrjTM O8o8kyP8Q1fhyAi9rjxd8BqHSTo3tQoe6ISZCjbkGbCu/UN6giA/HdHTsY5cd2gA M/YdYyTZjphKFm3/FaA+5HbW+OtCpnNufL4KFS2KlWS9XM48a+/MGrgmVp+xODpv L2WdXb+wTWDtSev2FSKxLrSRmjU+rrB4nqT3/9twzhHJ8zcyU4rRO1NJRAp1J5lx /tVswkYBuGO6O1tqRKaA =YZ/Y -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists