Handler on Duty: Johannes Ullrich
                    
                    Threat Level: green
                Thinking...
    
                
  | 
            
                
  | 
        ||||||||||||||||||||||||||||
| URL | 
|---|
| * DNS Cache Poisoning Report; Increase in Port Activity | 
| * DNS Cache Poisoning Report; Increase in Port Activity; SANS Conference | 
| Submitted By | Date | 
|---|---|
| Comment | |
| Quark | 2005-08-18 21:24:38 | 
| The Hat Squad Exploit has been fixed in NetVault 7.1.2 | |
| Hat-Squad Security Group | 2005-04-04 18:05:38 | 
| Hat-Squad Security Team has discovered multiple heap and stack buffer overflow vulnerabilities in Bakbone NetVault product. Technical Details: http://www.class101.org/netv-remhbof.pdf (remote heap overflow) http://www.class101.org/netv-locsbof.pdf (local stack overflow) Proof of Concept codes : http://class101.org/36/55/op.php http://www.hat-squad.com Solution: At the moment writing this advisory, NO PATCH IS RELEASED, we can only suggest to : Restrict all incoming connections to 20031/tcp and 20031/udp, a fix might come very soon. Hat-Squad Security Team, | |
| The FrSIRT | 2005-04-02 19:26:45 | 
| BakBone NetVault Multiple Remote Heap Overflow Vulnerabilities http://www.frsirt.com/english/advisories/2005/0309 | |
| 2004-11-17 23:23:35 | |
| This appears to be BakBone's NetVault primary communications port. | |
| CVE # | Description | 
|---|
              