Home / vulnerabilities akamai-client.txt
Posted on 07 June 2008
Source : packetstormsecurity.org Link
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ----------------------------------------------------
Akamai Technologies Security Advisory 2008-0003
* Akamai ID: 2008-0003
* Date: 2008/06/06
* Product Name: Akamai Client Software (formerly Red Swoosh)
* Affected Versions: Up to and including 3322
* Fixed Version: 3333
* CVE IDs: CVE-2008-1106
* CVSS Base Score: 5.53
* Product Description:
The Akamai Client Software is a software layer that securely stores and
transfers files to enhance content delivery.
* Vulnerability Description:
Akamai has become aware of a security vulnerability within the Akamai
Client Software which can be exploited to conduct cross-site request
forgery attacks. This vulnerability exists only in the Akamai Client
Software and does not affect Akamai's other services in any way.
Akamai has no evidence to date that any attempt has been made to exploit
this vulnerability.
* Patch Instructions:
No user interaction is required. Clients will be automatically upgraded.
* Credit:
CVE-2008-1106 was independently discovered and brought to Akamai's
attention by Dyon Balding of Secunia Research.
* About Akamai:
Akamai(r) is the leading global service provider for accelerating
content and business processes online. Thousands of organizations have
formed trusted relationships with Akamai, improving their revenue and
reducing costs by maximizing the performance of their online businesses.
Leveraging the Akamai EdgePlatform, these organizations gain business
advantage today, and have the foundation for the emerging Web solutions
of tomorrow. Akamai is "The Trusted Choice for Online Business." For
more information, visit www.akamai.com.
Our GPG public key:
http://www.akamai.com/dl/akamai/Akamai_Security_General.pub
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)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=ie/v
-----END PGP SIGNATURE-----