Handler on Duty: Didier Stevens
Threat Level: green
Thinking...
|
|
||||||||||||||||||||||||||||
| URL |
|---|
| * DNS Cache Poisoning Report; Increase in Port Activity |
| * DNS Cache Poisoning Report; Increase in Port Activity; SANS Conference |
| Submitted By | Date |
|---|---|
| Comment | |
| Quark | 2005-08-18 21:24:38 |
| The Hat Squad Exploit has been fixed in NetVault 7.1.2 | |
| Hat-Squad Security Group | 2005-04-04 18:05:38 |
| Hat-Squad Security Team has discovered multiple heap and stack buffer overflow vulnerabilities in Bakbone NetVault product. Technical Details: http://www.class101.org/netv-remhbof.pdf (remote heap overflow) http://www.class101.org/netv-locsbof.pdf (local stack overflow) Proof of Concept codes : http://class101.org/36/55/op.php http://www.hat-squad.com Solution: At the moment writing this advisory, NO PATCH IS RELEASED, we can only suggest to : Restrict all incoming connections to 20031/tcp and 20031/udp, a fix might come very soon. Hat-Squad Security Team, | |
| The FrSIRT | 2005-04-02 19:26:45 |
| BakBone NetVault Multiple Remote Heap Overflow Vulnerabilities http://www.frsirt.com/english/advisories/2005/0309 | |
| 2004-11-17 23:23:35 | |
| This appears to be BakBone's NetVault primary communications port. | |
| CVE # | Description |
|---|
