Re: Knox Arkeia remote root/system exploit
In-Reply-To: <BAY22-F8E04A402F7FD7B74F1A849C6E0@xxxxxxx>
>/*
>* Knox Arkeia Server Backup
>* arkeiad local/remote root exploit
>* Targets for Redhat 7.2/8.0, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE
>* Works up to current version 5.3.x
>*
>* ---------------
The buffer overflow bug has been fixed in version 5.3.5
This version is available on Arkeia ftp site:
ftp://ftp.arkeia.com/pub/arkeia5.3/arkeia-network-backup
Best regards,
Arnaud Spicht
CTO - Arkeia Corp