First published: Tue Apr 20 2010(Updated: )
The scsi-target-utils package contains the daemon and tools to set up and<br>monitor SCSI targets. Currently, iSCSI software and iSER targets are<br>supported.<br>A format string flaw was found in scsi-target-utils' tgtd daemon. A<br>remote attacker could trigger this flaw by sending a carefully-crafted<br>Internet Storage Name Service (iSNS) request, causing the tgtd daemon to<br>crash. (CVE-2010-0743)<br>All scsi-target-utils users should upgrade to this updated package, which<br>contains a backported patch to correct this issue. All running<br>scsi-target-utils services must be restarted for the update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/scsi-target-utils | <0.0-6.20091205snap.el5_5.2 | 0.0-6.20091205snap.el5_5.2 |
redhat/scsi-target-utils | <0.0-6.20091205snap.el5_5.2 | 0.0-6.20091205snap.el5_5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0362 is classified as important.
To fix RHSA-2010:0362, update the scsi-target-utils package to version 0.0-6.20091205snap.el5_5.2.
The impact of the vulnerability in RHSA-2010:0362 could allow a remote attacker to execute arbitrary code.
Systems running scsi-target-utils version up to 0.0-6.20091205snap.el5_5.2 are affected by RHSA-2010:0362.
The flaw in RHSA-2010:0362 relates to a format string vulnerability in the tgtd daemon.