Bugtraq mailing list archives
Re: Knox Arkeia remote root/system exploit
From: Arnaud Spicht <aspicht () arkeia com>
Date: 22 Feb 2005 21:47:19 -0000
In-Reply-To: <BAY22-F8E04A402F7FD7B74F1A849C6E0 () phx gbl>
/* * Knox Arkeia Server Backup * arkeiad local/remote root exploit * Targets for Redhat 7.2/8.0, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE * Works up to current version 5.3.x * * ---------------
The buffer overflow bug has been fixed in version 5.3.5 This version is available on Arkeia ftp site: ftp://ftp.arkeia.com/pub/arkeia5.3/arkeia-network-backup Best regards, Arnaud Spicht CTO - Arkeia Corp
Current thread:
- Knox Arkeia remote root/system exploit John Doe (Feb 19)
- Re: Knox Arkeia remote root/system exploit H D Moore (Feb 21)
- <Possible follow-ups>
- Re: Knox Arkeia remote root/system exploit Arnaud Spicht (Feb 23)