2009-2582 | Akamai Technologies Download Manager manager.exe memory corruption (BID-35778 / SA35951)


CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score
9.0 $0-$5k 0.47

A vulnerability, which was classified as very critical, was found in Akamai Technologies Download Manager. Affected is an unknown functionality of the file manager.exe. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was shared 07/23/2009 by iDefense Labs with iDEFENSE Labs (Website). The advisory is available at vupen.com. This vulnerability is traded as CVE-2009-2582 since 07/23/2009. It is possible to launch the attack remotely. The exploitation doesn’t require any form of authentication. Technical details are known, but there is no available exploit. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 08/12/2021).

It is declared as proof-of-concept. The vulnerability scanner Nessus provides a plugin with the ID 40363 (Akamai Download Manager ActiveX Control Windows.

Upgrading to version 2.2.0.0 eliminates this vulnerability.

The vulnerability is also documented in the databases at SecurityFocus (BID 35778), Secunia (SA35951), SecurityTracker (ID 1022592), Vulnerability Center (SBV-22975) and Tenable (40363).

Vendor

Name

VulDB Meta Base Score: 10.0
VulDB Meta Temp Score: 9.0

VulDB Base Score: 10.0
VulDB Temp Score: 9.0
VulDB Vector: 🔍
VulDB Reliability: 🔍

AV AC Au C I A
🔍 🔍 🔍 🔍 🔍 🔍
🔍 🔍 🔍 🔍 🔍 🔍
🔍 🔍 🔍 🔍 🔍 🔍
Vector Complexity Authentication Confidentiality Integrity Availability
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock


VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍

NVD Base Score: 🔍

Class: Memory corruption
CWE: CWE-119
ATT&CK: Unknown

Local: No
Remote: Yes

Availability: 🔍
Status: Proof-of-Concept

Price Prediction: 🔍
Current Price Estimation: 🔍


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock


Nessus ID: 40363
Nessus Name: Akamai Download Manager ActiveX Control Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍

Threat Intelligenceinfoedit

Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔍

Upgrade: Download Manager 2.2.0.0

07/22/2009 🔍
07/22/2009 +0 days 🔍
07/23/2009 +1 days 🔍
07/23/2009 +0 days 🔍
07/23/2009 +0 days 🔍
07/23/2009 +0 days 🔍
07/23/2009 +0 days 🔍
07/24/2009 +1 days 🔍
07/28/2009 +4 days 🔍
03/18/2015 +2059 days 🔍
08/12/2021 +2339 days 🔍Advisory: vupen.com
Researcher: iDefense Labs
Organization: iDEFENSE Labs
Status: Confirmed
Confirmation: 🔍

CVE: CVE-2009-2582 (🔍)
SecurityFocus: 35778 – Akamai Download Manager ActiveX Control Redswoosh Download Stack Buffer Overflow Vulnerability
Secunia: 35951 – Akamai Download Manager HTTP Header Buffer Overflow, Highly Critical
SecurityTracker: 1022592 – Akamai Download Manager Stack Overflow in Processing HTTP Responses Lets Remote Users Execute Arbitrary Code
Vulnerability Center: 22975 – Akamai Download Manager x3C 2.2.4.8 Stack-based buffer overflow Allows Remote Web Servers, Critical
Vupen: ADV-2009-1985

Created: 03/18/2015 15:15
Updated: 08/12/2021 20:54
Changes: (2) source_nessus_risk vulnerability_cvss2_nvd_basescore
Complete: 🔍

See the underground prices here!



Source link