Executive Summary
Summary | |
---|---|
Title | tgt vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-1156-1 | First vendor Publication | 2011-06-21 |
Vendor | Ubuntu | Last vendor Modification | 2011-06-21 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.04 - Ubuntu 10.10 Summary: An attacker could send crafted input to tgt and cause it to crash or run arbitrary programs. Software Description: - tgt: Linux SCSI target user-space tools Details: It was discovered that tgt incorrectly handled long iSCSI name strings, and invalid PDUs. A remote attacker could exploit this to cause tgt to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 10.10. (CVE-2010-2221) Emmanuel Bouillon discovered that tgt incorrectly handled certain iSCSI logins. A remote attacker could exploit this to cause tgt to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2011-0001) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.04: Ubuntu 10.10: In general, a standard system update will make all the necessary changes. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-1156-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-399 | Resource Management Errors |
50 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12861 | |||
Oval ID: | oval:org.mitre.oval:def:12861 | ||
Title: | DSA-2209-1 tgt -- double free | ||
Description: | Emmanuel Bouillon discovered a double free in tgt, the Linux SCSI target user-space tools, which could lead to denial of service. The oldstable distribution doesn't include tgt. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2209-1 CVE-2011-0001 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | tgt |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:13545 | |||
Oval ID: | oval:org.mitre.oval:def:13545 | ||
Title: | USN-1156-1 -- tgt vulnerabilities | ||
Description: | tgt: Linux SCSI target user-space tools An attacker could send crafted input to tgt and cause it to crash or run arbitrary programs. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1156-1 CVE-2010-2221 CVE-2011-0001 | Version: | 5 |
Platform(s): | Ubuntu 11.04 Ubuntu 10.10 | Product(s): | tgt |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21847 | |||
Oval ID: | oval:org.mitre.oval:def:21847 | ||
Title: | RHSA-2011:0332: scsi-target-utils security update (Important) | ||
Description: | Double free vulnerability in the iscsi_rx_handler function (usr/iscsi/iscsid.c) in the tgt daemon (tgtd) in Linux SCSI target framework (tgt) before 1.0.14, aka scsi-target-utils, allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown vectors related to a buffer overflow during iscsi login. NOTE: some of these details are obtained from third party information. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0332-01 CVE-2011-0001 CESA-2011:0332-CentOS 5 | Version: | 6 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 5 | Product(s): | scsi-target-utils |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22141 | |||
Oval ID: | oval:org.mitre.oval:def:22141 | ||
Title: | RHSA-2010:0518: scsi-target-utils security update (Important) | ||
Description: | Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0518-01 CESA-2010:0518 CVE-2010-2221 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | scsi-target-utils |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23038 | |||
Oval ID: | oval:org.mitre.oval:def:23038 | ||
Title: | ELSA-2010:0518: scsi-target-utils security update (Important) | ||
Description: | Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0518-01 CVE-2010-2221 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | scsi-target-utils |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23633 | |||
Oval ID: | oval:org.mitre.oval:def:23633 | ||
Title: | ELSA-2011:0332: scsi-target-utils security update (Important) | ||
Description: | Double free vulnerability in the iscsi_rx_handler function (usr/iscsi/iscsid.c) in the tgt daemon (tgtd) in Linux SCSI target framework (tgt) before 1.0.14, aka scsi-target-utils, allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown vectors related to a buffer overflow during iscsi login. NOTE: some of these details are obtained from third party information. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0332-01 CVE-2011-0001 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | scsi-target-utils |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:26560 | |||
Oval ID: | oval:org.mitre.oval:def:26560 | ||
Title: | DEPRECATED: ELSA-2010-0518 -- scsi-target-utils security update (important) | ||
Description: | [0.0-6.20091205snap.3] - Fix buffer overflow in isns scn handling (CVE-2010-2221) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010-0518 CVE-2010-2221 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | scsi-target-utils |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27751 | |||
Oval ID: | oval:org.mitre.oval:def:27751 | ||
Title: | DEPRECATED: ELSA-2011-0332 -- scsi-target-utils security update (important) | ||
Description: | [1.0.4-3.1] - fix the buffer overflow bug before iscsi login (CVE-2011-0001) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-0332 CVE-2011-0001 | Version: | 4 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | scsi-target-utils |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-07-30 | Name : CentOS Update for scsi-target-utils CESA-2011:0332 centos5 x86_64 File : nvt/gb_CESA-2011_0332_scsi-target-utils_centos5_x86_64.nasl |
2012-06-06 | Name : RedHat Update for scsi-target-utils RHSA-2011:0332-01 File : nvt/gb_RHSA-2011_0332-01_scsi-target-utils.nasl |
2011-08-09 | Name : CentOS Update for scsi-target-utils CESA-2010:0518 centos5 i386 File : nvt/gb_CESA-2010_0518_scsi-target-utils_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for scsi-target-utils CESA-2011:0332 centos5 i386 File : nvt/gb_CESA-2011_0332_scsi-target-utils_centos5_i386.nasl |
2011-07-18 | Name : Fedora Update for scsi-target-utils FEDORA-2011-8930 File : nvt/gb_fedora_2011_8930_scsi-target-utils_fc14.nasl |
2011-07-12 | Name : Fedora Update for scsi-target-utils FEDORA-2011-8890 File : nvt/gb_fedora_2011_8890_scsi-target-utils_fc15.nasl |
2011-06-24 | Name : Ubuntu Update for tgt USN-1156-1 File : nvt/gb_ubuntu_USN_1156_1.nasl |
2011-05-12 | Name : Debian Security Advisory DSA 2209-1 (tgt) File : nvt/deb_2209_1.nasl |
2010-07-16 | Name : Mandriva Update for iscsitarget MDVSA-2010:131 (iscsitarget) File : nvt/gb_mandriva_MDVSA_2010_131.nasl |
2010-04-30 | Name : Mandriva Update for yelp MDVA-2010:131 (yelp) File : nvt/gb_mandriva_MDVA_2010_131.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
74916 | Linux SCSI Target Framework (tgt) tgt daemon (tgtd) iscsi_rx_handler() Functi... |
65991 | Linux SCSI Target Framework (tgt) iSNS Message Remote Overflow |
65990 | Generic SCSI Target Subsystem for Linux (SCST) iSNS Message Remote Overflow |
Snort® IPS/IDS
Date | Description |
---|---|
2017-11-30 | iSCSI target multiple implementations iSNS stack buffer overflow attempt RuleID : 44675 - Revision : 1 - Type : SERVER-OTHER |
2014-01-10 | iSCSI target multiple implementations iSNS stack buffer overflow attempt RuleID : 17138 - Revision : 7 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_tgt-100805.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_iscsitarget-100805.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2010-0518.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2011-0332.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2010-0518.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20100708_scsi_target_utils_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20110309_scsi_target_utils_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2011-07-12 | Name : The remote Fedora host is missing a security update. File : fedora_2011-8930.nasl - Type : ACT_GATHER_INFO |
2011-07-11 | Name : The remote Fedora host is missing a security update. File : fedora_2011-8890.nasl - Type : ACT_GATHER_INFO |
2011-06-21 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1156-1.nasl - Type : ACT_GATHER_INFO |
2011-05-04 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_tgt-110418.nasl - Type : ACT_GATHER_INFO |
2011-04-15 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2011-0332.nasl - Type : ACT_GATHER_INFO |
2011-04-04 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2209.nasl - Type : ACT_GATHER_INFO |
2011-03-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0332.nasl - Type : ACT_GATHER_INFO |
2011-01-21 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_iscsitarget-100903.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_iscsitarget-100804.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_tgt-100819.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_iscsitarget-7109.nasl - Type : ACT_GATHER_INFO |
2010-09-14 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_tgt-100805.nasl - Type : ACT_GATHER_INFO |
2010-09-14 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_iscsitarget-100805.nasl - Type : ACT_GATHER_INFO |
2010-09-14 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_tgt-100805.nasl - Type : ACT_GATHER_INFO |
2010-09-14 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_iscsitarget-100804.nasl - Type : ACT_GATHER_INFO |
2010-07-16 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2010-0518.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:58:43 |
|