Akamai Client Software Authentication Flaw Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID: 1020208|
SecurityTracker URL: http://securitytracker.com/id/1020208
(Links to External Site)
Date: Jun 6 2008
Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 3322 and prior versions|
A vulnerability was reported in Akamai Client Software. A remote user can cause arbitrary code to be executed on the target user's system.|
The management interface (on TCP port 9421 on the loopback interface) authenticates commands based on the user-supplied HTTP Referer header. A remote user can conduct cross-site request forgery attacks to cause the system to execute arbitrary commands.
A remote user can create specially crafted HTML that, when loaded by the target user, will issue a command to the management interface to cause the system to download and execute arbitrary files.
The vendor was notified on May 13, 2008.
The product was formerly called 'Red Swoosh'.
Dyon Balding of Secunia Research reported this vulnerability.
A remote user can create HTML that, when loaded by the target user, will download and execute arbitrary code on the target user's system.|
The vendor has issued a fixed version (3333), available automatically.|
Vendor URL: www.akamai.com/ (Links to External Site)
Access control error|
|Underlying OS: Windows (Any)|
Source Message Contents
Subject: Akamai Technologies Security Advisory 2008-0003 (Akamai Client Software)|
-----BEGIN PGP SIGNED MESSAGE-----
Akamai Technologies Security Advisory 2008-0003
* Akamai ID: 2008-0003
* Date: 2008/06/06
* Product Name: Akamai Client Software (formerly Red Swoosh)
* Affected Versions: Up to and including 3322
* Fixed Version: 3333
* CVE IDs: CVE-2008-1106
* CVSS Base Score: 5.53
* Product Description:
The Akamai Client Software is a software layer that securely stores and
transfers files to enhance content delivery.
* Vulnerability Description:
Akamai has become aware of a security vulnerability within the Akamai
Client Software which can be exploited to conduct cross-site request
forgery attacks. This vulnerability exists only in the Akamai Client
Software and does not affect Akamai's other services in any way.
Akamai has no evidence to date that any attempt has been made to exploit
* Patch Instructions:
No user interaction is required. Clients will be automatically upgraded.
CVE-2008-1106 was independently discovered and brought to Akamai's
attention by Dyon Balding of Secunia Research.
* About Akamai:
Akamai(r) is the leading global service provider for accelerating
content and business processes online. Thousands of organizations have
formed trusted relationships with Akamai, improving their revenue and
reducing costs by maximizing the performance of their online businesses.
Leveraging the Akamai EdgePlatform, these organizations gain business
advantage today, and have the foundation for the emerging Web solutions
of tomorrow. Akamai is "The Trusted Choice for Online Business." For
more information, visit www.akamai.com.
Our GPG public key:
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)
-----END PGP SIGNATURE-----