Knox Arkeia Backup Client Type 77 Request Processing Buffer Remote Overflow - Nessus

Critical   Plugin ID: 17158

This page contains detailed information about the Knox Arkeia Backup Client Type 77 Request Processing Buffer Remote Overflow Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.

Plugin Overview


ID: 17158
Name: Knox Arkeia Backup Client Type 77 Request Processing Buffer Remote Overflow
Filename: arkeia_type77_overflow.nasl
Vulnerability Published: 2005-02-18
This Plugin Published: 2005-02-21
Last Modification Time: 2018-11-15
Plugin Version: 1.18
Plugin Type: remote
Plugin Family: Gain a shell remotely
Dependencies: arkeia_default_account.nasl

Vulnerability Information


Severity: Critical
Vulnerability Published: 2005-02-18
Patch Published: N/A
CVE [?]: CVE-2005-0491
CPE [?]: N/A

Synopsis

The remote backup service is prone to a buffer overflow attack.

Description

The remote host is running Arkeia Network Backup agent, used for backups of the remote host.

The remote version of this agent contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary commands on the remote host with the privileges of the Arkeia daemon, usually root.

Solution

Upgrade to Arkeia 5.3.5, 5.2.28 our 5.1.21.

Public Exploits


Target Network Port(s): 617
Target Asset(s): N/A
Exploit Available: True (Metasploit Framework, Exploit-DB, Core Impact)
Exploit Ease: Exploits are available

Here's the list of publicly known exploits and PoCs for verifying the Knox Arkeia Backup Client Type 77 Request Processing Buffer Remote Overflow vulnerability:

  1. Metasploit: exploit/windows/arkeia/type77
    [Arkeia Backup Client Type 77 Overflow (Win32)]
  2. Metasploit: exploit/osx/arkeia/type77
    [Arkeia Backup Client Type 77 Overflow (Mac OS X)]
  3. Exploit-DB: exploits/osx/remote/9930.rb
    [EDB-9930: Knox Arkeia Backup Client 5.3.3 Type 77 (OSX) - Overflow (Metasploit)]
  4. Exploit-DB: exploits/windows_x86/remote/16466.rb
    [EDB-16466: Knox Arkeia Backup Client Type 77 (Windows x86) - Remote Overflow (Metasploit)]
  5. Exploit-DB: exploits/osx/remote/16865.rb
    [EDB-16865: Knox Arkeia Backup Client Type 77 (OSX) - Remote Overflow (Metasploit)]

Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.

WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. These exploits and PoCs could contain malware. For more information, see how to use exploits safely.

Risk Information


CVSS V2 Vector [?]: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C
CVSS Base Score:10.0 (High)
Impact Subscore:10.0
Exploitability Subscore:10.0
CVSS Temporal Score:8.3 (High)
CVSS Environmental Score:NA (None)
Modified Impact Subscore:NA
Overall CVSS Score:8.3 (High)

Go back to menu.

Plugin Source


This is the arkeia_type77_overflow.nasl nessus plugin source code. This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(17158);
 script_version("1.18");
 script_cve_id("CVE-2005-0491");
 script_bugtraq_id(12594);

 script_name(english:"Knox Arkeia Backup Client Type 77 Request Processing Buffer Remote Overflow");

 script_set_attribute(attribute:"synopsis", value:
"The remote backup service is prone to a buffer overflow attack." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Arkeia Network Backup agent, used for
backups of the remote host. 

The remote version of this agent contains a buffer overflow
vulnerability that may allow an attacker to execute arbitrary commands
on the remote host with the privileges of the Arkeia daemon, usually
root." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2005/Feb/413" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Arkeia 5.3.5, 5.2.28 our 5.1.21." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"exploit_framework_core", value:"true");
 script_set_attribute(attribute:"metasploit_name", value:'Arkeia Backup Client Type 77 Overflow (Win32)');
 script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"plugin_publication_date", value: "2005/02/21");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/02/18");
 script_cvs_date("Date: 2018/11/15 20:50:22");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"Checks the version number of the remote arkeia daemon");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 script_family(english:"Gain a shell remotely");
 script_require_ports(617);
 script_dependencie("arkeia_default_account.nasl");
 exit(0);
}


version =  get_kb_item("arkeia-client/617");
if ( ! version ) exit(0);
if ( ereg(pattern:"^([0-4]\.|5\.0|5\.1\.([0-9](1?[^0-9]|$)|20)|5\.2\.(1?[0-9]([^0-9]|$)|2[0-7])|5\.3\.[0-4]([^0-9]|$))", string:version))
	security_hole(617);

The latest version of this script can be found in these locations depending on your platform:

  • Linux / Unix:
    /opt/nessus/lib/nessus/plugins/arkeia_type77_overflow.nasl
  • Windows:
    C:\ProgramData\Tenable\Nessus\nessus\plugins\arkeia_type77_overflow.nasl
  • Mac OS X:
    /Library/Nessus/run/lib/nessus/plugins/arkeia_type77_overflow.nasl

Go back to menu.

How to Run


Here is how to run the Knox Arkeia Backup Client Type 77 Request Processing Buffer Remote Overflow as a standalone plugin via the Nessus web user interface (https://localhost:8834/):

  1. Click to start a New Scan.
  2. Select Advanced Scan.
  3. Navigate to the Plugins tab.
  4. On the top right corner click to Disable All plugins.
  5. On the left side table select Gain a shell remotely plugin family.
  6. On the right side table select Knox Arkeia Backup Client Type 77 Request Processing Buffer Remote Overflow plugin ID 17158.
  7. Specify the target on the Settings tab and click to Save the scan.
  8. Run the scan.

Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.

Basic usage:

/opt/nessus/bin/nasl arkeia_type77_overflow.nasl -t <IP/HOST>

Run the plugin with audit trail message on the console:

/opt/nessus/bin/nasl -a arkeia_type77_overflow.nasl -t <IP/HOST>

Run the plugin with trace script execution written to the console (useful for debugging):

/opt/nessus/bin/nasl -T - arkeia_type77_overflow.nasl -t <IP/HOST>

Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):

/opt/nessus/bin/nasl -K /tmp/state arkeia_type77_overflow.nasl -t <IP/HOST>

Go back to menu.

References


BID | SecurityFocus Bugtraq ID: See also: Similar and related Nessus plugins:
  • 74217 - Default Password (arkeia) for 'root' Account
  • 74262 - Western Digital Arkeia 10.1.x < 10.1.19 / 10.2.x < 10.2.9 Multiple Vulnerabilities (Heartbleed)
  • 74220 - Western Digital Arkeia lang Cookie Local File Inclusion
  • 74221 - Western Digital Arkeia lang Cookie Crafted Local File Inclusion

Version


This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file arkeia_type77_overflow.nasl version 1.18. For more plugins, visit the Nessus Plugin Library.

Go back to menu.