Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-2221

Опубликовано: 08 июл. 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

dapper

DNE

devel

DNE

esm-apps/xenial

not-affected

2.4.20.3+svn499-0ubuntu2.3
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [2.4.20.3+svn499-0ubuntu2.3]]
hardy

ignored

end of life
jaunty

ignored

end of life
karmic

ignored

end of life

Показывать по

РелизСтатусПримечание
artful

not-affected

1:1.0.13-0ubuntu2
bionic

not-affected

1:1.0.13-0ubuntu2
cosmic

not-affected

1:1.0.13-0ubuntu2
dapper

DNE

devel

not-affected

1:1.0.13-0ubuntu2
esm-infra-legacy/trusty

not-affected

1:1.0.13-0ubuntu2
esm-infra/bionic

not-affected

1:1.0.13-0ubuntu2
esm-infra/xenial

not-affected

1:1.0.13-0ubuntu2
hardy

ignored

end of life
jaunty

ignored

end of life

Показывать по

EPSS

Процентиль: 90%
0.06077
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 15 лет назад

Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.

nvd
почти 15 лет назад

Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.

debian
почти 15 лет назад

Multiple buffer overflows in the iSNS implementation in isns.c in (1) ...

github
около 3 лет назад

Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.

oracle-oval
почти 15 лет назад

ELSA-2010-0518: scsi-target-utils security update (IMPORTANT)

EPSS

Процентиль: 90%
0.06077
Низкий

5 Medium

CVSS2