5
CVSSv2

CVE-2010-2221

Published: 08/07/2010 Updated: 13/02/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) prior to 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and previous versions, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and previous versions allow remote malicious users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.

Vulnerable Product Search on Vulmon Subscribe to Product

zaal tgt

zaal tgt 0.9.5

zaal tgt 1.0.0

zaal tgt 1.0.1

zaal tgt 1.0.2

zaal tgt 1.0.3

zaal tgt 1.0.4

arne redlich \\& ross walker iscsitarget 0.4.4

arne redlich \\& ross walker iscsitarget 0.4.10

arne redlich \\& ross walker iscsitarget 0.2.4

arne redlich \\& ross walker iscsitarget 0.3.0

arne redlich \\& ross walker iscsitarget 0.3.3

arne redlich \\& ross walker iscsitarget 0.4.6

arne redlich \\& ross walker iscsitarget 0.4.11

arne redlich \\& ross walker iscsitarget 0.4.0

arne redlich \\& ross walker iscsitarget 0.4.5

arne redlich \\& ross walker iscsitarget 0.4.15

arne redlich \\& ross walker iscsitarget 0.4.13

arne redlich \\& ross walker iscsitarget 0.4.2

arne redlich \\& ross walker iscsitarget 0.2.3

arne redlich \\& ross walker iscsitarget 1.4.18

arne redlich \\& ross walker iscsitarget 1.4.19

arne redlich \\& ross walker iscsitarget 0.4.12

arne redlich \\& ross walker iscsitarget 0.2.2

arne redlich \\& ross walker iscsitarget 0.3.2

arne redlich \\& ross walker iscsitarget 0.4.7

arne redlich \\& ross walker iscsitarget 0.2.5

arne redlich \\& ross walker iscsitarget

arne redlich \\& ross walker iscsitarget 0.2.1

arne redlich \\& ross walker iscsitarget 0.3.8

arne redlich \\& ross walker iscsitarget 0.3.1

arne redlich \\& ross walker iscsitarget 0.1.0

arne redlich \\& ross walker iscsitarget 0.4.17

arne redlich \\& ross walker iscsitarget 0.4.1

arne redlich \\& ross walker iscsitarget 0.3.4

arne redlich \\& ross walker iscsitarget 0.4.14

arne redlich \\& ross walker iscsitarget 0.2.0

arne redlich \\& ross walker iscsitarget 0.3.6

arne redlich \\& ross walker iscsitarget 0.2.6

arne redlich \\& ross walker iscsitarget 0.4.3

arne redlich \\& ross walker iscsitarget 0.4.8

arne redlich \\& ross walker iscsitarget 0.3.5

arne redlich \\& ross walker iscsitarget 0.4.16

arne redlich \\& ross walker iscsitarget 0.3.7

arne redlich \\& ross walker iscsitarget 0.4.9

vladislav_bolkhovitin generic_scsi_target_subsystem

vladislav_bolkhovitin generic_scsi_target_subsystem 0.9.0a

vladislav_bolkhovitin generic_scsi_target_subsystem 0.9.1

vladislav_bolkhovitin generic_scsi_target_subsystem 0.9.2

vladislav_bolkhovitin generic_scsi_target_subsystem 0.9.3

vladislav_bolkhovitin generic_scsi_target_subsystem 0.9.4

vladislav_bolkhovitin generic_scsi_target_subsystem 0.9.5

vladislav_bolkhovitin generic_scsi_target_subsystem 0.9.5.1

vladislav_bolkhovitin generic_scsi_target_subsystem 0.9.5.2

vladislav_bolkhovitin generic_scsi_target_subsystem 1.0.0

Vendor Advisories

An attacker could send crafted input to tgt and cause it to crash or run arbitrary programs ...