CVE Vulnerabilities

CVE-2010-0743

Use of Externally-Controlled Format String

Published: Apr 08, 2010 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 IMPORTANT
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Multiple format string vulnerabilities in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) 1.0.3, 0.9.5, and earlier and (2) iSCSI Enterprise Target (aka iscsitarget) 0.4.16 allow remote attackers to cause a denial of service (tgtd daemon crash) or possibly have unspecified other impact via vectors that involve the isns_attr_query and qry_rsp_handle functions, and are related to (a) client appearance and (b) client disappearance messages.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
TgtZaal*0.9.5 (including)
TgtZaal1.0.3 (including)1.0.3 (including)
Red Hat Enterprise Linux 5RedHatscsi-target-utils-0:0.0-6.20091205snap.el5_5.2*
IscsitargetUbuntuhardy*
IscsitargetUbuntuintrepid*
IscsitargetUbuntujaunty*
IscsitargetUbuntukarmic*
IscsitargetUbuntulucid*
IscsitargetUbuntuupstream*
TgtUbuntuhardy*
TgtUbuntujaunty*
TgtUbuntukarmic*
TgtUbuntulucid*
TgtUbuntuupstream*

Potential Mitigations

References