From a24567fbc43f221b14e805f9bc0b7c6d16911c46 Mon Sep 17 00:00:00 2001 From: Alex Legler Date: Sun, 8 Mar 2015 22:02:38 +0100 Subject: Import existing advisories --- glsa-201201-06.xml | 58 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 58 insertions(+) create mode 100644 glsa-201201-06.xml (limited to 'glsa-201201-06.xml') diff --git a/glsa-201201-06.xml b/glsa-201201-06.xml new file mode 100644 index 00000000..ec7ac79d --- /dev/null +++ b/glsa-201201-06.xml @@ -0,0 +1,58 @@ + + + + + + iSCSI Enterprise Target: Arbitrary code execution + Format string vulnerabilities in iSCSI Enterprise Target could + result in execution of arbitrary code or a Denial of Service. + + iscsitarget + January 23, 2012 + January 23, 2012: 1 + 314187 + remote + + + 1.4.19 + 1.4.19 + + + +

iSCSI Enterprise Target is an open source iSCSI target with professional + features. +

+
+ +

Multiple functions in usr/iscsi/isns.c of iSCSI Enterprise Target + contain format string errors. +

+
+ +

A remote attacker could send a specially-crafted Internet Storage Name + Service (iSNS) request, possibly resulting in the execution of arbitrary + code with root privileges or cause a Denial of Service. +

+
+ +

There is no known workaround at this time.

+
+ +

All iSCSI Enterprise Target users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-block/iscsitarget-1.4.19" + + +

NOTE: This is a legacy GLSA. Updates for all affected architectures are + available since August 11, 2010. It is likely that your system is already + no longer affected by this issue. +

+
+ + CVE-2010-0743 + + craig + ackle +
-- cgit v1.2.3-65-gdbad