Executive Summary

Summary
Title tgt vulnerabilities
Informations
Name USN-1156-1 First vendor Publication 2011-06-21
Vendor Ubuntu Last vendor Modification 2011-06-21
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.04 - Ubuntu 10.10

Summary:

An attacker could send crafted input to tgt and cause it to crash or run arbitrary programs.

Software Description: - tgt: Linux SCSI target user-space tools

Details:

It was discovered that tgt incorrectly handled long iSCSI name strings, and invalid PDUs. A remote attacker could exploit this to cause tgt to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 10.10. (CVE-2010-2221)

Emmanuel Bouillon discovered that tgt incorrectly handled certain iSCSI logins. A remote attacker could exploit this to cause tgt to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2011-0001)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 11.04:
tgt 1:1.0.13-0ubuntu2.1

Ubuntu 10.10:
tgt 1:1.0.4-1ubuntu4.1

In general, a standard system update will make all the necessary changes.

References:
CVE-2010-2221, CVE-2011-0001

Package Information:
https://launchpad.net/ubuntu/+source/tgt/1:1.0.13-0ubuntu2.1
https://launchpad.net/ubuntu/+source/tgt/1:1.0.4-1ubuntu4.1

Original Source

Url : http://www.ubuntu.com/usn/USN-1156-1

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-399 Resource Management Errors
50 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12861
 
Oval ID: oval:org.mitre.oval:def:12861
Title: DSA-2209-1 tgt -- double free
Description: Emmanuel Bouillon discovered a double free in tgt, the Linux SCSI target user-space tools, which could lead to denial of service. The oldstable distribution doesn't include tgt.
Family: unix Class: patch
Reference(s): DSA-2209-1
CVE-2011-0001
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): tgt
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13545
 
Oval ID: oval:org.mitre.oval:def:13545
Title: USN-1156-1 -- tgt vulnerabilities
Description: tgt: Linux SCSI target user-space tools An attacker could send crafted input to tgt and cause it to crash or run arbitrary programs.
Family: unix Class: patch
Reference(s): USN-1156-1
CVE-2010-2221
CVE-2011-0001
Version: 5
Platform(s): Ubuntu 11.04
Ubuntu 10.10
Product(s): tgt
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21847
 
Oval ID: oval:org.mitre.oval:def:21847
Title: RHSA-2011:0332: scsi-target-utils security update (Important)
Description: Double free vulnerability in the iscsi_rx_handler function (usr/iscsi/iscsid.c) in the tgt daemon (tgtd) in Linux SCSI target framework (tgt) before 1.0.14, aka scsi-target-utils, allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown vectors related to a buffer overflow during iscsi login. NOTE: some of these details are obtained from third party information.
Family: unix Class: patch
Reference(s): RHSA-2011:0332-01
CVE-2011-0001
CESA-2011:0332-CentOS 5
Version: 6
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 5
Product(s): scsi-target-utils
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22141
 
Oval ID: oval:org.mitre.oval:def:22141
Title: RHSA-2010:0518: scsi-target-utils security update (Important)
Description: Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.
Family: unix Class: patch
Reference(s): RHSA-2010:0518-01
CESA-2010:0518
CVE-2010-2221
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): scsi-target-utils
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23038
 
Oval ID: oval:org.mitre.oval:def:23038
Title: ELSA-2010:0518: scsi-target-utils security update (Important)
Description: Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.
Family: unix Class: patch
Reference(s): ELSA-2010:0518-01
CVE-2010-2221
Version: 6
Platform(s): Oracle Linux 5
Product(s): scsi-target-utils
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23633
 
Oval ID: oval:org.mitre.oval:def:23633
Title: ELSA-2011:0332: scsi-target-utils security update (Important)
Description: Double free vulnerability in the iscsi_rx_handler function (usr/iscsi/iscsid.c) in the tgt daemon (tgtd) in Linux SCSI target framework (tgt) before 1.0.14, aka scsi-target-utils, allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown vectors related to a buffer overflow during iscsi login. NOTE: some of these details are obtained from third party information.
Family: unix Class: patch
Reference(s): ELSA-2011:0332-01
CVE-2011-0001
Version: 6
Platform(s): Oracle Linux 6
Product(s): scsi-target-utils
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26560
 
Oval ID: oval:org.mitre.oval:def:26560
Title: DEPRECATED: ELSA-2010-0518 -- scsi-target-utils security update (important)
Description: [0.0-6.20091205snap.3] - Fix buffer overflow in isns scn handling (CVE-2010-2221)
Family: unix Class: patch
Reference(s): ELSA-2010-0518
CVE-2010-2221
Version: 4
Platform(s): Oracle Linux 5
Product(s): scsi-target-utils
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27751
 
Oval ID: oval:org.mitre.oval:def:27751
Title: DEPRECATED: ELSA-2011-0332 -- scsi-target-utils security update (important)
Description: [1.0.4-3.1] - fix the buffer overflow bug before iscsi login (CVE-2011-0001)
Family: unix Class: patch
Reference(s): ELSA-2011-0332
CVE-2011-0001
Version: 4
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): scsi-target-utils
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 13
Application 14

OpenVAS Exploits

Date Description
2012-07-30 Name : CentOS Update for scsi-target-utils CESA-2011:0332 centos5 x86_64
File : nvt/gb_CESA-2011_0332_scsi-target-utils_centos5_x86_64.nasl
2012-06-06 Name : RedHat Update for scsi-target-utils RHSA-2011:0332-01
File : nvt/gb_RHSA-2011_0332-01_scsi-target-utils.nasl
2011-08-09 Name : CentOS Update for scsi-target-utils CESA-2010:0518 centos5 i386
File : nvt/gb_CESA-2010_0518_scsi-target-utils_centos5_i386.nasl
2011-08-09 Name : CentOS Update for scsi-target-utils CESA-2011:0332 centos5 i386
File : nvt/gb_CESA-2011_0332_scsi-target-utils_centos5_i386.nasl
2011-07-18 Name : Fedora Update for scsi-target-utils FEDORA-2011-8930
File : nvt/gb_fedora_2011_8930_scsi-target-utils_fc14.nasl
2011-07-12 Name : Fedora Update for scsi-target-utils FEDORA-2011-8890
File : nvt/gb_fedora_2011_8890_scsi-target-utils_fc15.nasl
2011-06-24 Name : Ubuntu Update for tgt USN-1156-1
File : nvt/gb_ubuntu_USN_1156_1.nasl
2011-05-12 Name : Debian Security Advisory DSA 2209-1 (tgt)
File : nvt/deb_2209_1.nasl
2010-07-16 Name : Mandriva Update for iscsitarget MDVSA-2010:131 (iscsitarget)
File : nvt/gb_mandriva_MDVSA_2010_131.nasl
2010-04-30 Name : Mandriva Update for yelp MDVA-2010:131 (yelp)
File : nvt/gb_mandriva_MDVA_2010_131.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
74916 Linux SCSI Target Framework (tgt) tgt daemon (tgtd) iscsi_rx_handler() Functi...

65991 Linux SCSI Target Framework (tgt) iSNS Message Remote Overflow

65990 Generic SCSI Target Subsystem for Linux (SCST) iSNS Message Remote Overflow

Snort® IPS/IDS

Date Description
2017-11-30 iSCSI target multiple implementations iSNS stack buffer overflow attempt
RuleID : 44675 - Revision : 1 - Type : SERVER-OTHER
2014-01-10 iSCSI target multiple implementations iSNS stack buffer overflow attempt
RuleID : 17138 - Revision : 7 - Type : SERVER-OTHER

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_tgt-100805.nasl - Type : ACT_GATHER_INFO
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_iscsitarget-100805.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2010-0518.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2011-0332.nasl - Type : ACT_GATHER_INFO
2013-01-24 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2010-0518.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20100708_scsi_target_utils_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20110309_scsi_target_utils_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2011-07-12 Name : The remote Fedora host is missing a security update.
File : fedora_2011-8930.nasl - Type : ACT_GATHER_INFO
2011-07-11 Name : The remote Fedora host is missing a security update.
File : fedora_2011-8890.nasl - Type : ACT_GATHER_INFO
2011-06-21 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1156-1.nasl - Type : ACT_GATHER_INFO
2011-05-04 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_tgt-110418.nasl - Type : ACT_GATHER_INFO
2011-04-15 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2011-0332.nasl - Type : ACT_GATHER_INFO
2011-04-04 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2209.nasl - Type : ACT_GATHER_INFO
2011-03-10 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0332.nasl - Type : ACT_GATHER_INFO
2011-01-21 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_iscsitarget-100903.nasl - Type : ACT_GATHER_INFO
2010-12-02 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_iscsitarget-100804.nasl - Type : ACT_GATHER_INFO
2010-12-02 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_tgt-100819.nasl - Type : ACT_GATHER_INFO
2010-10-11 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_iscsitarget-7109.nasl - Type : ACT_GATHER_INFO
2010-09-14 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_tgt-100805.nasl - Type : ACT_GATHER_INFO
2010-09-14 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_iscsitarget-100805.nasl - Type : ACT_GATHER_INFO
2010-09-14 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_tgt-100805.nasl - Type : ACT_GATHER_INFO
2010-09-14 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_iscsitarget-100804.nasl - Type : ACT_GATHER_INFO
2010-07-16 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2010-0518.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:58:43
  • Multiple Updates