Computer Security
[EN] securityvulns.ru no-pyccku


Multiple iSCSI implementations security vulnerabilities
Published:06.07.2010
Source:
SecurityVulns ID:10970
Type:remote
Threat Level:
6/10
Description:Buffer overflow on iSNS message parsing.
Affected:ISCSITARGET : iscsitarget 1.4
 SCST : iscsi-scst 1.0
 TGT : tgt 1.0
CVE:CVE-2010-2221 (Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.)
Original documentdocumentnoreply_(at)_telus.com, TELUS Security Labs VR - iSCSI target Multiple Implementations iSNS Stack Buffer Overflow (06.07.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod