After carefully examining issues recently discussed in public technical forums, Arkeia Corp. has immediately released a new version to block any potential invasion of Arkeia protected networks.
ANB 5.3.5 fixes a buffer overflow bug that could allow a remote attacker to remotely execute arbitrary code, and thereby get root access to the machine.
The fix is also applicable to previous versions of Arkeia (5.1, 5.2, Arkeia Light). The appropriate packages can be found on the Arkeia websites:
* http://www.arkeia.com/donwload/anb/ (Version 5.3.5) * http://www.arkeia.com/donwload/52/ (Version 5.2.28) * http://www.arkeia.com/donwload/51/ (Version 5.1.21)
For Arkeia light: http://www.arkeia.org/download/light/
If you are using Arkeia in an untrusted environment such as a publicly accessible Web server or corporate mail gateway, it is strongly advised to upgrade to this version. The bug is in the arkeiad daemon process, making it necessary to upgrade all the sensitive client machines.
Arkeia users should also remember to take into account Arkeia security recommendations in the Arkeia User Manual "Appendix B: System Security." We urge you to read again the sections describing how to secure Arkeia against system-level intrusion. Arkeia_User_Manual.pdf -> Arkeia_User_Manual.pdf or http://www.arkeia.com/manuals.html
To stay up-to-date on all new releases and upgrades of Arkeia Enterprise Solutions, you can subscribe to Arkeia Announcements at http://www.arkeia.com/mailinglists/