Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-17840

Опубликовано: 27 дек. 2017
Источник: ubuntu
Приоритет: medium
CVSS2: 4.6
CVSS3: 7.8

Описание

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

2.0.874-5ubuntu2.3
cosmic

not-affected

2.0.874-5ubuntu2.3
devel

not-affected

2.0.874-5ubuntu2.3
esm-infra-legacy/trusty

not-affected

esm-infra/bionic

not-affected

2.0.874-5ubuntu2.3
esm-infra/xenial

not-affected

precise/esm

not-affected

trusty

not-affected

trusty/esm

not-affected

Показывать по

4.6 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
около 8 лет назад

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

CVSS3: 7.8
nvd
около 8 лет назад

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

CVSS3: 7.8
debian
около 8 лет назад

An issue was discovered in Open-iSCSI through 2.0.875. A local attacke ...

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

4.6 Medium

CVSS2

7.8 High

CVSS3