APP: iSCSI target Multiple Implementations Format String Code Execution

This signature detects attempts to exploit a known format string vulnerability in multiple implementations iSCSI target. iSCSI, an abbreviation of Internet Small Computer System Interface, is an Internet Protocol (IP)-based storage networking standard for linking data storage facilities. It can be leveraged by remote unauthenticated attackers to inject and execute arbitrary code on a vulnerable system.

Extended Description

iSCSI Enterprise Target and tgt are prone to multiple format-string vulnerabilities because they fail to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function. An attacker may exploit these issues to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will result in a denial-of-service condition. Other attacks may also be possible, including data loss or corruption.

Affected Products

Debian linux

References

BugTraq: 39127

CVE: CVE-2010-0743

Short Name
APP:ISCSI-TARGET-FMT-STR
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
CVE-2010-0743 Code Execution Format Implementations Multiple String bid:39127 iSCSI target
Release Date
10/07/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
TCP/1024-3127,3129-7999,8001-8079,8081-65535
False Positive
Unknown
Vendors

Red_hat

Gentoo

Tgt_project

Slackware

Mandriva

Iscsi_enterprise_target

Debian

CVSS Score

5.0

Found a potential security threat?