Re: [Full-Disclosure] Knox Arkeia 5.1.21 local/remote root exploit

2003-09-20 Thread Christian Gut
On Fre, 2003-09-19 at 19:36, A. C. wrote: > Exploit attached for Knox Arkeia Pro v5.1.21 backup > software from http://www.arkeia.com. Seems not to work correctly on debian. It kills arkeiad but does not spawn the bindshell. -- Christian Gut <[EMAIL PROTECTED]> signature.asc Description: This

Re: [Full-Disclosure] Knox Arkeia 5.1.21 local/remote root exploit

2003-09-19 Thread David Hane
Have you tested this on other versions? DH On Friday 19 September 2003 10:36, A. C. wrote: > Exploit attached for Knox Arkeia Pro v5.1.21 backup > software from http://www.arkeia.com. > > > > > /* > * Knox Arkiea arkiead local/remote root exploit. > * > * Portbind 5074 shellcode > * > * Test

[Full-Disclosure] Knox Arkeia 5.1.21 local/remote root exploit

2003-09-19 Thread A. C.
Exploit attached for Knox Arkeia Pro v5.1.21 backup software from http://www.arkeia.com. /* * Knox Arkiea arkiead local/remote root exploit. * * Portbind 5074 shellcode * * Tested on Redhat 8.0, Redhat 7.2, but all versions are presumed vulnerable. * * NULLs out least significant byte