Linux SCSI Target Framework isns.c format string
|lstf-isns-format-string (57496)||High Risk|
Linux SCSI Target Framework could allow a local attacker to execute arbitrary code on the system, caused by a format string error in isns.c. An attacker could exploit this vulnerability using malicious format specifiers to execute arbitrary code on the system or cause the application to crash.
Refer to git.kernel.org for patch, upgrade or suggested workaround information. See References.
- git.kernel.org: fix format string vulnerability.
- BID-39127: iSCSI Enterprise Target and tgt Multiple Format String Vulnerabilities
- CVE-2010-0743: Multiple format string vulnerabilities in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) 1.0.3, 0.9.5, and earlier and (2) iSCSI Enterprise Target (aka iscsitarget) 0.4.16 allow remote attackers to cause a denial of service (tgtd daemon crash) or possibly have unspecified other impact via vectors that involve the isns_attr_query and qry_rsp_handle functions, and are related to (a) client appearance and (b) client disappearance messages.
- DSA-2042: iscsitarget -- format string
- OSVDB ID: 63418: Linux SCSI Target Framework (tgt) usr/iscsi/isns.c Multiple Function Format String
- RHSA-2010-0362: Important: scsi-target-utils security update
- SA39142: Linux SCSI Target Framework (tgt) Format String Vulnerabilities
- SUSE-SR:2010:017: (java-1_4_2-ibm, sudo, libpng, php5, tgt, iscsitarget, aria2, pcsc-lite, tomcat5, tomcat6, lvm2, libvirt, rpm, libtiff, dovecot12)
- Debian Debian Linux 5.0
- RedHat RHEL Cluster Storage 5
- tgt Project Linux SCSI target framework 0.9.5
Mar 24, 2010
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.