Lucene search

K
saintSAINT CorporationSAINT:CC45EED5186609E101B411313F334ECA
HistoryJan 24, 2006 - 12:00 a.m.

Arkeia Type 77 Request buffer overflow

2006-01-2400:00:00
SAINT Corporation
my.saintcorporation.com
29

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.596

Percentile

97.8%

Added: 01/24/2006
CVE: CVE-2005-0491
BID: 12594
OSVDB: 14011

Background

The Arkeia network backup software includes a daemon program called **arkeiad** which listens for connections on TCP port 617.

Problem

A buffer overflow in the processing of type 77 requests sent to the **arkeiad** listener allows remote attackers to execute commands.

Resolution

Upgrade to Arkeia stable version 5.3.5 or higher.

References

<http://archives.neohapsis.com/archives/fulldisclosure/2005-02/0487.html&gt;

Limitations

Exploit works on Arkeia Network Backup Client 5.2.27.

Platforms

Windows
Linux

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.596

Percentile

97.8%