exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Akamai NetSession 1.9.3.1 DLL Hijacking

Akamai NetSession 1.9.3.1 DLL Hijacking
Posted Jan 4, 2017
Authored by Felipe Xavier Oliveira

Tempest Security Intelligence Advisory ADV-8/2016 - Akamai Netsession 1.9.3.1 is vulnerable to dll hijacking as it tries to load CSUNSAPI.dll without supplying the complete path. The issue is aggravated because the mentioned dll is missing from its installation. Thus making it possible to hijack the dll and subsequently inject code within the Akamai NetSession process space.

tags | advisory
SHA-256 | 3dedecb489ed5a0d9fc62c3d0f0b03779be049ff0c99d1d773806ff026f848c7

Akamai NetSession 1.9.3.1 DLL Hijacking

Change Mirror Download
=====[ Tempest Security Intelligence - ADV-8/2016 ]=============================

Unsafe DLL search path in Akamai NetSession 1.9.3.1

Author: Felipe Xavier Oliveira < engfilipeoliveira89 () gmail.com >

Tempest Security Intelligence - Recife, Pernambuco - Brazil

=====[ Table of Contents ]======================================================

1. Overview
2. Detailed description
3. Timeline of disclosure
4. Thanks & Acknowledgements
5. References

=====[ 1. Overview ]============================================================

* System affected : Akamai NetSession [1].
* Software Version : 1.9.3.1 (other versions may also be affected).
* Impact : If a low privileged user is infected, a malware is capable
of injecting code into Akamai NetSession process without
privilege elevation.


=====[ 2. Detailed description ]================================================

Akamai Netsession 1.9.3.1 is vulnerable to DLL Hijack, it tries to load
CSUNSAPI.dll without supplying the complete path. The issue is aggravated
because the mentioned DLL is missing from its installation. Thus making it
possible to hijack the DLL and subsequently inject code within Akamai
NetSession process space.

=====[ 3. Timeline of disclosure ]=============================================

09/23/2016 - Reported vulnerability to security@akamai.com.
09/23/2016 - Akamai acknowledges the vulnerability and asks for two weeks in
order to fix the vulnerability.
10/07/2016 - Asked if they were able to fix it in the accorded time, but haven't
heard back from them.
12/11/2016 - Advisory publication date.

=====[ 4. Thanks & Acknowledgements ]===========================================

- Breno Cunha < brenodario () gmail.com >
- Felipe Azevedo < felipe3gomes () gmail.com >
- Tempest Security Intelligence / Tempest's Pentest Team [2]

=====[ 5. References ]==========================================================

[1] https://www.akamai.com/us/en/solutions/products/media-delivery/netsession-
interface-design.jsp

[2] http://www.tempest.com.br/

=====[ EOF ]====================================================================
Login or Register to add favorites

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close