The Arkeia network backup software includes a daemon program called
**arkeiad** which listens for connections on TCP port 617.
A buffer overflow in the processing of type 77 requests sent to the
**arkeiad** listener allows remote attackers to execute commands.
Upgrade to Arkeia stable version 5.3.5 or higher.
Exploit works on Arkeia Network Backup Client 5.2.27.