1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Akamai Download Manager BO

HTTP Akamai Download Manager BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects an attempt to exploit an Buffer Overflow vulnerability in Akamai Download Manager ActiveX Control.

Additional Information

The Akamai Download Manager ActiveX control is a web based file download manager application.

The application is prone to multiple remote buffer-overflow vulnerabilities because the software fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer.

Specifically, an attacker can entice a victim user to visit a malicious web site and trigger the execution of a stack-based buffer-overflow.

Exploiting these issues allows remote attackers to execute arbitrary code in the context of applications using the affected ActiveX control and to compromise affected computers. Failed attempts will likely result in denial-of-service conditions.

These issues affect Akamai Download Manager prior to version 2.2.1.0; other versions may also be affected.

Affected

  • Akamai Download Manager 2.2.0.0
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube