Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-17840

Опубликовано: 27 дек. 2017
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
open-iscsifixed2.0.874-5package
open-iscsino-dsastretchpackage
open-iscsiignoredjessiepackage
open-iscsinot-affectedwheezypackage

Примечания

  • https://www.openwall.com/lists/oss-security/2017/12/13/2

  • https://bugzilla.opensuse.org/show_bug.cgi?id=1072312

  • Specfic CVE fixed by https://github.com/open-iscsi/open-iscsi/pull/72/commits/b9c33683bdc0aed28ffe31c3f3d50bf5cdf519ea

  • But all of the commits in https://github.com/open-iscsi/open-iscsi/pull/72

  • should be applied.

  • Not marking the issue as unimportant, since vulnerable source is present, but

  • not in all suites iscsiuio is built.

EPSS

Процентиль: 37%
0.00161
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

CVSS3: 6.5
redhat
около 8 лет назад

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

CVSS3: 7.8
nvd
около 8 лет назад

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

EPSS

Процентиль: 37%
0.00161
Низкий