APP: iSCSI target Multiple Implementations iSNS Stack Buffer Overflow

This signature detects attempts to exploit a known stack buffer overflow vulnerability in iSCSI Enterprise. It is caused by insufficient boundary checking while processing SCN messages. A remote attacker can leverage this to inject and execute arbitrary code on a vulnerable system.

Extended Description

Multiple implementations of iSCSI Enterprise Target are prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data. An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will result in a denial-of-service condition. The following products are affected: iSCSI Enterprise Target 1.4.20.1 and prior Generic SCSI Target Subsystem for Linux 1.0.1.1 and prior Linux SCSI target framework 1.0 and prior

Affected Products

Generic_scsi_target_subsystem_for_linux generic_scsi_target_subsystem_for_linux,Ubuntu ubuntu_linux

References

BugTraq: 41327

CVE: CVE-2010-2221

Short Name
APP:ISCSI-TARGET-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Buffer CVE-2010-2221 Implementations Multiple Overflow Stack bid:41327 iSCSI iSNS target
Release Date
10/01/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
TCP/1024-3127,3129-7999,8001-8079,8081-65535
False Positive
Unknown
Vendors

Red_hat

Generic_scsi_target_subsystem_for_linux

Tgt_project

Ubuntu

Mandriva

Iscsi_enterprise_target

CVSS Score

5.0

Found a potential security threat?