CVE-2010-2221

Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:zaal:tgt:*:*:*:*:*:*:*:*
cpe:2.3:a:zaal:tgt:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:zaal:tgt:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:zaal:tgt:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:zaal:tgt:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:zaal:tgt:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:zaal:tgt:1.0.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:*:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.3:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.4:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.5:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.2.6:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.6:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.7:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.3.8:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.4:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.5:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.6:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.7:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.8:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.9:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.10:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.11:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.12:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.13:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.14:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.15:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.16:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:0.4.17:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:1.4.18:*:*:*:*:*:*:*
cpe:2.3:a:arne_redlich_\&_ross_walker:iscsitarget:1.4.19:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:*:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.0a:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.3:pre1:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.3:pre2:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.3:pre4:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:0.9.5.2:*:*:*:*:*:*:*
cpe:2.3:a:vladislav_bolkhovitin:generic_scsi_target_subsystem:1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Feb 2023, 04:20

Type Values Removed Values Added
References
  • {'url': 'https://access.redhat.com/security/cve/CVE-2010-2221', 'name': 'https://access.redhat.com/security/cve/CVE-2010-2221', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2010:0518', 'name': 'https://access.redhat.com/errata/RHSA-2010:0518', 'tags': [], 'refsource': 'MISC'}
Summary CVE-2010-2221 scsi-target-utils: stack buffer overflow vulnerability Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.

02 Feb 2023, 17:17

Type Values Removed Values Added
Summary Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU. CVE-2010-2221 scsi-target-utils: stack buffer overflow vulnerability
References
  • (MISC) https://access.redhat.com/security/cve/CVE-2010-2221 -
  • (MISC) https://access.redhat.com/errata/RHSA-2010:0518 -

Information

Published : 2010-07-08 18:30

Updated : 2023-12-10 11:03


NVD link : CVE-2010-2221

Mitre link : CVE-2010-2221

CVE.ORG link : CVE-2010-2221


JSON object : View

Products Affected

vladislav_bolkhovitin

  • generic_scsi_target_subsystem

linux

  • linux_kernel

arne_redlich_\&_ross_walker

  • iscsitarget

zaal

  • tgt
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer