VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-2221
tgt, iscsitarget, generic_scsi_target_subsystem: Multiple buffer overflows in the iSNS implementatio...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2221

Original

Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an i...

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-07-08
Source Information Category:
Advisory, Alert
Last Updated:
2010-07-09




Affected Product Tags
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.1.0
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.2.0
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.2.1
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.2.2
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.2.3
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.2.4
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.2.5
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.2.6
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.3.0
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.3.1
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.3.2
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.3.3
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.3.4
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.3.5
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.3.6
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.3.7
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.3.8
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.0
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.1
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.10
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.11
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.12
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.13
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.14
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.15
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.16
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.17
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.2
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.3
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.4
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.5
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.6
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.7
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.8
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:0.4.9
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:1.4.18
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:1.4.19
cpe:/a:arne_redlich_%26_ross_walker:iscsitarget:1.4.20 and previous versions
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.0a
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.1
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.2
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.3
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.3:pre1
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.3:pre2
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.3:pre4
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.4
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.5
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.5.1
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.5.2
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:1.0.0
cpe:/a:vladislav_bolkhovitin:generic_scsi_target_subsystem:1.0.1 and previous versions
cpe:/a:zaal:tgt:0.9.5
cpe:/a:zaal:tgt:1.0.0
cpe:/a:zaal:tgt:1.0.1
cpe:/a:zaal:tgt:1.0.2
cpe:/a:zaal:tgt:1.0.3
cpe:/a:zaal:tgt:1.0.4
cpe:/a:zaal:tgt:1.0.5 and previous versions
cpe:/o:linux:linux_kernel
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
Medium [?]
X Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

Alternatives




References
BID 41327




BUGTRAQ 20100702 TELUS Security Labs VR - iSCSI target Multiple Implementations iSNS Stack Buffer Overflow




CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=593877




CONFIRM http://scst.svn.sourceforge.net/viewvc/scst?view=revision&revision=1793




CONFIRM http://scst.svn.sourceforge.net/viewvc/scst/trunk/iscsi-scst/usr/isns.c?r1=1793&r2=1792&pathrev=1793




FULLDISC 20100702 TELUS Security Labs VR - iSCSI target Multiple Implementations iSNS Stack Buffer Overflow




MLIST [iscsitarget-devel] 20100701 [patch] fix iSNS bounds checking




MLIST [stgt] 20100701 1.0.6 released




OSVDB 65992




OSVDB 65991




OSVDB 65990




SECUNIA 40495




SECUNIA 40494




SECUNIA 40485




Vulnerability Type Buffer Errors (CWE-119)





Copyright © 2010 JPCERT/CC All Rights Reserved.