First published: Wed May 19 2010(Updated: )
It was reported that a stack buffer overflow vulnerability exists in multiple implementations of iSCSI target, including scsi-target-utils. A missing bounds check when handling SCN messages could result in a buffer overflow when the iSCSI Name string is longer than 1008 bytes, which could lead to corruption of sensitive stack data. During investigation, more buffer overflow vulnerabilities were discovered as well. Acknowledgements: Red Hat would like to thank the Vulnerability Research Team at TELUS Security Labs and Fujita Tomonori for responsibly reporting these flaws.
Affected Software | Affected Version | How to fix |
---|---|---|
scsi-target-utils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-593877 is considered critical due to the potential for a stack buffer overflow.
To fix REDHAT-BUG-593877, ensure that you update the scsi-target-utils to the latest version released by Red Hat.
The systems affected by REDHAT-BUG-593877 include multiple implementations of iSCSI target, notably Red Hat scsi-target-utils.
The potential consequences of REDHAT-BUG-593877 include application crashes and unauthorized access to system resources due to a buffer overflow.
You can determine if your version is affected by REDHAT-BUG-593877 by checking your installed version of scsi-target-utils against the known vulnerable versions listed in Red Hat advisories.