Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

APP:ARKEIA:DEFAULT-ADMIN-PW

Severity

Major

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

Arkeia Network Backup Default Admin Password

Release Date

2005/02/23

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

APP: Arkeia Network Backup Default Admin Password


This signature detects attempts to connect to the Arkeia Network Backup Agent file system with the default admin username and password. Several incidences of this signature can indicate that attackers are proactively attempting to exploit the numerous vulnerabilities in this software.

Extended Description

The Knox Arkeia Server is prone to a remotely exploitable stack-based buffer overrun. The issue occurs because the software fails to do sufficient bounds checking when handling data contained within a type 77 request packet. A remote attacker may leverage this issue to execute arbitrary code in the context of the vulnerable service.

Affected Products

  • Knox_software arkeia 4.0.0
  • Knox_software arkeia 4.1.0
  • Knox_software arkeia 4.2.0
  • Knox_software arkeia 5.2.0
  • Knox_software arkeia 5.3.0

References

  • BugTraq: 12594
  • CVE: CVE-2005-0496
  • URL: http://metasploit.com/projects/Framework/exploits.html
  • URL: http://www.securityfocus.com/archive/1/390936
  • URL: http://www.knox-software.com/

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out