[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: Arkeia Network Backup Client Remote Access
From: H D Moore <sflist () digitaloffense ! net>
Date: 2005-02-20 20:41:36
Message-ID: 200502201441.36809.sflist () digitaloffense ! net
[Download RAW message or body]
Anyone able to connect to TCP port 617 can gain read/write access to the
filesystem of any host running the Arkeia agent software. This appears to
be an intentional design decision on the part of the Arkeia developers. A
long-winded description of this issue, complete with screen shots,
demonstration code, and packet captures can found online at:
- http://metasploit.com/research/arkeia_agent/
-HD
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic