Akamai Technologies Security Advisory 2008-0003 (Akamai Client Software)

2008.06.11
Risk: High
Local: No
Remote: Yes


CVSS Base Score: 7.1/10
Impact Subscore: 6.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Complete
Availability impact: None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ---------------------------------------------------- Akamai Technologies Security Advisory 2008-0003 * Akamai ID: 2008-0003 * Date: 2008/06/06 * Product Name: Akamai Client Software (formerly Red Swoosh) * Affected Versions: Up to and including 3322 * Fixed Version: 3333 * CVE IDs: CVE-2008-1106 * CVSS Base Score: 5.53 * Product Description: The Akamai Client Software is a software layer that securely stores and transfers files to enhance content delivery. * Vulnerability Description: Akamai has become aware of a security vulnerability within the Akamai Client Software which can be exploited to conduct cross-site request forgery attacks. This vulnerability exists only in the Akamai Client Software and does not affect Akamai's other services in any way. Akamai has no evidence to date that any attempt has been made to exploit this vulnerability. * Patch Instructions: No user interaction is required. Clients will be automatically upgraded. * Credit: CVE-2008-1106 was independently discovered and brought to Akamai's attention by Dyon Balding of Secunia Research. * About Akamai: Akamai(r) is the leading global service provider for accelerating content and business processes online. Thousands of organizations have formed trusted relationships with Akamai, improving their revenue and reducing costs by maximizing the performance of their online businesses. Leveraging the Akamai EdgePlatform, these organizations gain business advantage today, and have the foundation for the emerging Web solutions of tomorrow. Akamai is "The Trusted Choice for Online Business." For more information, visit www.akamai.com. Our GPG public key: http://www.akamai.com/dl/akamai/Akamai_Security_General.pub -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (Darwin) iQIcBAEBAgAGBQJISVLQAAoJEEngXEVbkoPOu3IQAJ4gOT9aCwG+f1ZJYLReUC8Y C5GIL0W2IVPhiRsNbFBZvlDze+d0y8kHLuXgNPerD0biGIi97Jl1mOU/RcnO2Ynn bV3glkkDdfdUtobrHRl9A8Fd2Y8GekF0QkB6ehqqFbRl81CMftykVwm/PkwqXFTF GxUOaw2TsjLwrYMQdkR+PN9P5P2oNwG3khtMnFugSNeEmtH5EoE8QYVWqFovho3X o6+e8/XzHC5eoF8S3VU7xHzQaoL45Wc6oRGMPn/FAbD+r5jmpzsI+vutc+yo1ZkG GYJMxu33ny+OVncKrQo+WmX1yPqA5ahWlBEWn0FuPzaxW8SomAu02OV77mspcG9j ApJc9S53zDP+fFiCwcEYiogzOfkHO7rt1qtwrj6jCvPphh3GKHR2zOt48zCOqY6c Q6poYoZyPSTUQz1UQzTJ2ck0oyOGSQpOMXDPxBK81g5DPhkt8BlxZ8KDXMBH49Pt zCQeMTSYu3cjBab49fc1NB40bB0WO/isz7lCHtPvudiItpqVAvngZp6hpKX2fLF4 KFR4qyoBU6zYA0VWnWiM5TMP+aEW/zumt9WcruauqtC8UbHGHlMftptAEa9ZmmEu RwDb3UPinnOmeF3dz32l3EY9t39/Eqop/hglpyKkj44UjCRwAy/a1N7pU7NmDdWj YR5C4Mv+U3Ptp0SNPFvt =ie/v -----END PGP SIGNATURE-----

References:

http://secunia.com/advisories/30135
http://xforce.iss.net/xforce/xfdb/42895
http://www.securityfocus.com/archive/1/archive/1/493170/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/493169/100/0/threaded
http://secunia.com/secunia_research/2008-19/advisory/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top