Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-17840

Опубликовано: 22 дек. 2017
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

Отчет

Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5iscsi-initiator-utilsWill not fix
Red Hat Enterprise Linux 6iscsi-initiator-utilsWill not fix
Red Hat Enterprise Linux 7iscsi-initiator-utilsWill not fix
Red Hat Enterprise Linux 8iscsi-initiator-utilsWill not fix
Red Hat Enterprise Linux 9iscsi-initiator-utilsNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1529176iscsi-initiator-utils: Heap-based buffer overflow in process_iscsid_broadcast()

EPSS

Процентиль: 37%
0.00161
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

CVSS3: 7.8
nvd
около 8 лет назад

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

CVSS3: 7.8
debian
около 8 лет назад

An issue was discovered in Open-iSCSI through 2.0.875. A local attacke ...

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

EPSS

Процентиль: 37%
0.00161
Низкий

6.5 Medium

CVSS3