← Voltar para CVEs
CVE-2010-0743
N/ADescricao
Multiple format string vulnerabilities in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) 1.0.3, 0.9.5, and earlier and (2) iSCSI Enterprise Target (aka iscsitarget) 0.4.16 allow remote attackers to cause a denial of service (tgtd daemon crash) or possibly have unspecified other impact via vectors that involve the isns_attr_query and qry_rsp_handle functions, and are related to (a) client appearance and (b) client disappearance messages.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado4/8/2010
Ultima modificacao4/29/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
iscsitarget:iscsitargetzaal:tgt
Fraquezas (CWE)
CWE-134
Referencias
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=574935(secalert@redhat.com)
http://git.kernel.org/?p=linux/kernel/git/tomo/tgt.git%3Ba=commit%3Bh=107d922706cd36f3bb79bcca9bc4678c32f22e59(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html(secalert@redhat.com)
http://marc.info/?l=oss-security&m=127005132403189&w=2(secalert@redhat.com)
http://secunia.com/advisories/39142(secalert@redhat.com)
http://secunia.com/advisories/39726(secalert@redhat.com)
http://www.debian.org/security/2010/dsa-2042(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:131(secalert@redhat.com)
http://www.securityfocus.com/bid/39127(secalert@redhat.com)
http://www.vupen.com/english/advisories/2010/1786(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=576359(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/57496(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11248(secalert@redhat.com)
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=574935(af854a3a-2127-422b-91ae-364da2661108)
http://git.kernel.org/?p=linux/kernel/git/tomo/tgt.git%3Ba=commit%3Bh=107d922706cd36f3bb79bcca9bc4678c32f22e59(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=oss-security&m=127005132403189&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/39142(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/39726(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2010/dsa-2042(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2010:131(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/39127(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1786(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=576359(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/57496(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11248(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.