10
CVSSv2

CVE-2005-0491

Published: 02/05/2005 Updated: 11/07/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in Knox Arkeia Server Backup 5.3.x allows remote malicious users to execute arbitrary code via a long type 77 request.

Vulnerable Product Search on Vulmon Subscribe to Product

knox software arkeia server backup 5.3.2

knox software arkeia server backup 5.3.3

knox software arkeia server backup 5.3.0_rc2

knox software arkeia server backup 5.3.0_rc3

knox software arkeia server backup 5.3.0_rc4

knox software arkeia server backup 5.3.1

knox software arkeia server backup 5.3.0

knox software arkeia server backup 5.3.0_rc1

knox software arkeia server backup 5.3.4

Exploits

/* * Knox Arkiea Server Backup * arkiead local/remote root exploit * Targets for Redhat 72/80, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE * Works up to current version 53x * * --------------- * * Linux x86: * /arksink2 <arkeia_host> <target_type> <display> * * Exports an xterm to the box of your choosing Make su ...
## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Ms ...
## # $Id: type77rb 9262 2010-05-09 17:45:00Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploi ...
## # $Id: type77rb 9262 2010-05-09 17:45:00Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploi ...
/* * Knox Arkiea arkiead local/remote root exploit * * Portbind 5074 shellcode * * Tested on Redhat 80, Redhat 72, but all versions are presumed vulnerable * * NULLs out least significant byte of EBP to pull EIP out of overflow buffer * A previous request forces a large allocation of NOP's + shellcode in heap * memory Find addition ...