7.9
CVSSv2

CVE-2013-2850

Published: 07/06/2013 Updated: 07/11/2023
CVSS v2 Base Score: 7.9 | Impact Score: 10 | Exploitability Score: 5.5
VMScore: 704
Vector: AV:A/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel up to and including 3.9.4 allows remote malicious users to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel-rt packages that fix several security issues and multiplebugs are now available for Red Hat Enterprise MRG 23The Red Hat Security Response Team has rated this update as havingimportant ...
Several security issues were fixed in the kernel ...
The system could be made to crash or run programs as an administrator if it received specially crafted network traffic ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
The system could be made to crash or run programs as an administrator if it received specially crafted network traffic ...
The system could be made to crash or run programs as an administrator if it received specially crafted network traffic ...
The system could be made to crash or run programs as an administrator if it received specially crafted network traffic ...
Several security issues were fixed in the kernel ...
Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parametersc in the iSCSI target subsystem in the Linux kernel through 394 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled ...