Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Akamai Client Software Vendors:   Akamai Technologies
Akamai Client Software Authentication Flaw Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1020208
SecurityTracker URL:
CVE Reference:   CVE-2008-1106   (Links to External Site)
Date:  Jun 6 2008
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3322 and prior versions
Description:   A vulnerability was reported in Akamai Client Software. A remote user can cause arbitrary code to be executed on the target user's system.

The management interface (on TCP port 9421 on the loopback interface) authenticates commands based on the user-supplied HTTP Referer header. A remote user can conduct cross-site request forgery attacks to cause the system to execute arbitrary commands.

A remote user can create specially crafted HTML that, when loaded by the target user, will issue a command to the management interface to cause the system to download and execute arbitrary files.

The vendor was notified on May 13, 2008.

The product was formerly called 'Red Swoosh'.

Dyon Balding of Secunia Research reported this vulnerability.

Impact:   A remote user can create HTML that, when loaded by the target user, will download and execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fixed version (3333), available automatically.
Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  Akamai Technologies Security Advisory 2008-0003 (Akamai Client Software)

Hash: SHA1

- ----------------------------------------------------
Akamai Technologies Security Advisory 2008-0003

* Akamai ID:         2008-0003
* Date:              2008/06/06
* Product Name:      Akamai Client Software (formerly Red Swoosh)
* Affected Versions: Up to and including 3322
* Fixed Version:     3333
* CVE IDs:           CVE-2008-1106
* CVSS Base Score:   5.53

* Product Description:

The Akamai Client Software is a software layer that securely stores and
transfers files to enhance content delivery.

* Vulnerability Description:

Akamai has become aware of a security vulnerability within the Akamai
Client Software which can be exploited to conduct cross-site request
forgery attacks.  This vulnerability exists only in the Akamai Client
Software and does not affect Akamai's other services in any way.
Akamai has no evidence to date that any attempt has been made to exploit
this vulnerability.

* Patch Instructions:

No user interaction is required. Clients will be automatically upgraded.

* Credit:

CVE-2008-1106 was independently discovered and brought to Akamai's
attention by Dyon Balding of Secunia Research.

* About Akamai:

Akamai(r) is the leading global service provider for accelerating
content and business processes online. Thousands of organizations have
formed trusted relationships with Akamai, improving their revenue and
reducing costs by maximizing the performance of their online businesses.
Leveraging the Akamai EdgePlatform, these organizations gain business
advantage today, and have the foundation for the emerging Web solutions
of tomorrow. Akamai is "The Trusted Choice for Online Business." For
more information, visit

Our GPG public key:
Version: GnuPG v1.4.9 (Darwin)



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC