Handler on Duty: Xavier Mertens
Threat Level: green
Loading...
|
|
URL |
---|
* DNS Cache Poisoning Report; Increase in Port Activity |
* DNS Cache Poisoning Report; Increase in Port Activity; SANS Conference |
Submitted By | Date |
---|---|
Comment | |
Quark | 2005-08-18 21:24:38 |
The Hat Squad Exploit has been fixed in NetVault 7.1.2 | |
Hat-Squad Security Group | 2005-04-04 18:05:38 |
Hat-Squad Security Team has discovered multiple heap and stack buffer overflow vulnerabilities in Bakbone NetVault product. Technical Details: http://www.class101.org/netv-remhbof.pdf (remote heap overflow) http://www.class101.org/netv-locsbof.pdf (local stack overflow) Proof of Concept codes : http://class101.org/36/55/op.php http://www.hat-squad.com Solution: At the moment writing this advisory, NO PATCH IS RELEASED, we can only suggest to : Restrict all incoming connections to 20031/tcp and 20031/udp, a fix might come very soon. Hat-Squad Security Team, | |
The FrSIRT | 2005-04-02 19:26:45 |
BakBone NetVault Multiple Remote Heap Overflow Vulnerabilities http://www.frsirt.com/english/advisories/2005/0309 | |
2004-11-17 23:23:35 | |
This appears to be BakBone's NetVault primary communications port. |
CVE # | Description |
---|