Input validation error in tgt - CVE-2011-0001
Published: March 15, 2011 / Updated: August 11, 2020
tgt
Detailed vulnerability description
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown vectors related to a buffer overflow during iscsi login.
How to mitigate CVE-2011-0001
Sources
- http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
- http://lists.wpkg.org/pipermail/stgt/2011-March/004473.html
- http://secunia.com/advisories/43706
- http://secunia.com/advisories/43713
- http://www.debian.org/security/2011/dsa-2209
- http://www.redhat.com/support/errata/RHSA-2011-0332.html
- http://www.securityfocus.com/bid/46817
- http://www.securitytracker.com/id?1025184
- http://www.vupen.com/english/advisories/2011/0636
- https://bugzilla.redhat.com/attachment.cgi?id=473779&action=diff
- https://bugzilla.redhat.com/show_bug.cgi?id=667261
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66010