[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Akamai NetSession 1.9.3.1 DLL Hijacking Vulnerability

Author
Felipe Xavier Oliveira
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-26613
Category
local exploits
Date add
04-01-2017
Platform
windows
=====[ Tempest Security Intelligence - ADV-8/2016 ]=============================
   
  Unsafe DLL search path in Akamai NetSession 1.9.3.1

  Author: Felipe Xavier Oliveira < engfilipeoliveira89 () gmail.com >
  
  Tempest Security Intelligence - Recife, Pernambuco - Brazil

=====[ Table of Contents ]======================================================
  
1. Overview  
2. Detailed description    
3. Timeline of disclosure    
4. Thanks & Acknowledgements  
5. References

=====[ 1. Overview ]============================================================
 
* System affected  : Akamai NetSession [1].
* Software Version : 1.9.3.1 (other versions may also be affected).
* Impact           : If a low privileged user is infected, a malware is capable 
                     of injecting code into Akamai NetSession process without
                     privilege elevation.


=====[ 2. Detailed description ]================================================

Akamai Netsession 1.9.3.1 is vulnerable to DLL Hijack, it tries to load 
CSUNSAPI.dll without supplying the complete path. The issue is aggravated 
because the mentioned DLL is missing from its installation. Thus making it 
possible to hijack the DLL and subsequently inject code within Akamai 
NetSession process space.

=====[ 3. Timeline of disclosure  ]=============================================

09/23/2016 - Reported vulnerability to security@akamai.com.
09/23/2016 - Akamai acknowledges the vulnerability and asks for two weeks in 
             order to fix the vulnerability.
10/07/2016 - Asked if they were able to fix it in the accorded time, but haven't
             heard back from them.
12/11/2016 - Advisory publication date.

=====[ 4. Thanks & Acknowledgements ]===========================================

- Breno Cunha    < brenodario () gmail.com >
- Felipe Azevedo < felipe3gomes () gmail.com >
- Tempest Security Intelligence / Tempest's Pentest Team [2]

=====[ 5. References ]==========================================================

[1] https://www.akamai.com/us/en/solutions/products/media-delivery/netsession-
    interface-design.jsp

[2] http://www.tempest.com.br/

#  0day.today [2024-11-14]  #