Short Name |
APP:ISCSI-TARGET-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
iSCSI target Multiple Implementations iSNS Stack Buffer Overflow |
Release Date |
2010/10/01 |
Update Number |
1784 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known stack buffer overflow vulnerability in iSCSI Enterprise. It is caused by insufficient boundary checking while processing SCN messages. A remote attacker can leverage this to inject and execute arbitrary code on a vulnerable system.
Multiple implementations of iSCSI Enterprise Target are prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data. An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will result in a denial-of-service condition. The following products are affected: iSCSI Enterprise Target 1.4.20.1 and prior Generic SCSI Target Subsystem for Linux 1.0.1.1 and prior Linux SCSI target framework 1.0 and prior