lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050222214719.31178.qmail@www.securityfocus.com>
Date: 22 Feb 2005 21:47:19 -0000
From: Arnaud Spicht <aspicht@...eia.com>
To: bugtraq@...urityfocus.com
Subject: Re: Knox Arkeia remote root/system exploit


In-Reply-To: <BAY22-F8E04A402F7FD7B74F1A849C6E0@....gbl>

>/*
>* Knox Arkeia Server Backup
>* arkeiad local/remote root exploit
>* Targets for Redhat 7.2/8.0, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE
>* Works up to current version 5.3.x
>*
>* ---------------

The buffer overflow bug has been fixed in version 5.3.5
This version is available on Arkeia ftp site:
ftp://ftp.arkeia.com/pub/arkeia5.3/arkeia-network-backup

Best regards,
Arnaud Spicht
CTO - Arkeia Corp


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ