Multiple format string vulnerabilities in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) 1.0.3, 0.9.5, and earlier and (2) iSCSI Enterprise Target (aka iscsitarget) 0.4.16 allow remote attackers to cause a denial of service (tgtd daemon crash) or possibly have unspecified other impact via vectors that involve the isns_attr_query and qry_rsp_handle functions, and are related to (a) client appearance and (b) client disappearance messages.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tgt | Zaal | * | 0.9.5 (including) |
Tgt | Zaal | 1.0.3 (including) | 1.0.3 (including) |
Red Hat Enterprise Linux 5 | RedHat | scsi-target-utils-0:0.0-6.20091205snap.el5_5.2 | * |
Iscsitarget | Ubuntu | hardy | * |
Iscsitarget | Ubuntu | intrepid | * |
Iscsitarget | Ubuntu | jaunty | * |
Iscsitarget | Ubuntu | karmic | * |
Iscsitarget | Ubuntu | lucid | * |
Iscsitarget | Ubuntu | upstream | * |
Tgt | Ubuntu | hardy | * |
Tgt | Ubuntu | jaunty | * |
Tgt | Ubuntu | karmic | * |
Tgt | Ubuntu | lucid | * |
Tgt | Ubuntu | upstream | * |