Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2010-2221

Опубликовано: 08 июл. 2010
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:zaal:tgt:*:*:*:*:*:*:*:*
Версия до 1.0.5 (включая)
cpe:2.3:a:zaal:tgt:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:zaal:tgt:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:zaal:tgt:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:zaal:tgt:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:zaal:tgt:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:zaal:tgt:1.0.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:*:*:*:*:*:*:*:*
Версия до 1.4.20 (включая)
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.3:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.4:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.5:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.6:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.6:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.7:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.8:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.4:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.5:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.6:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.7:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.8:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.9:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.10:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.11:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.12:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.13:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.14:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.15:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.16:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.17:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:1.4.18:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:1.4.19:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

Одно из

cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:*:*:*:*:*:*:*:*
Версия до 1.0.1 (включая)
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.0a:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.3:pre1:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.3:pre2:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.3:pre4:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

EPSS

Процентиль: 90%
0.06077
Низкий

5 Medium

CVSS2

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 15 лет назад

Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.

redhat
почти 15 лет назад

Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.

debian
почти 15 лет назад

Multiple buffer overflows in the iSNS implementation in isns.c in (1) ...

github
около 3 лет назад

Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.

oracle-oval
почти 15 лет назад

ELSA-2010-0518: scsi-target-utils security update (IMPORTANT)

EPSS

Процентиль: 90%
0.06077
Низкий

5 Medium

CVSS2

Дефекты

CWE-119