On Fre, 2003-09-19 at 19:36, A. C. wrote:
> Exploit attached for Knox Arkeia Pro v5.1.21 backup
> software from http://www.arkeia.com.
Seems not to work correctly on debian. It kills arkeiad but does not
spawn the bindshell.
--
Christian Gut <[EMAIL PROTECTED]>
signature.asc
Description: This
Have you tested this on other versions?
DH
On Friday 19 September 2003 10:36, A. C. wrote:
> Exploit attached for Knox Arkeia Pro v5.1.21 backup
> software from http://www.arkeia.com.
>
>
>
>
> /*
> * Knox Arkiea arkiead local/remote root exploit.
> *
> * Portbind 5074 shellcode
> *
> * Test
Exploit attached for Knox Arkeia Pro v5.1.21 backup
software from http://www.arkeia.com.
/*
* Knox Arkiea arkiead local/remote root exploit.
*
* Portbind 5074 shellcode
*
* Tested on Redhat 8.0, Redhat 7.2, but all versions
are presumed vulnerable.
*
* NULLs out least significant byte