[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    Arkeia Network Backup Client Remote Access
From:       H D Moore <sflist () digitaloffense ! net>
Date:       2005-02-20 20:41:36
Message-ID: 200502201441.36809.sflist () digitaloffense ! net
[Download RAW message or body]

Anyone able to connect to TCP port 617 can gain read/write access to the 
filesystem of any host running the Arkeia agent software. This appears to 
be an intentional design decision on the part of the Arkeia developers. A 
long-winded description of this issue, complete with screen shots, 
demonstration code, and packet captures can found online at:

 - http://metasploit.com/research/arkeia_agent/

-HD
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic