安全研究

安全漏洞
Linux SCSI Target Framework远程格式串漏洞

发布日期:2010-03-31
更新日期:2010-04-21

受影响系统:
FUJITA Tomonori Linux SCSI target framework 1.0.3
FUJITA Tomonori Linux SCSI target framework 0.9.5
iSCSI Enterprise Target iSCSI Enterprise Target 0.4.16
iSCSI Enterprise Target iSCSI Enterprise Target 0.4.15
不受影响系统:
iSCSI Enterprise Target iSCSI Enterprise Target 0.4.19
描述:
BUGTRAQ  ID: 39127
CVE(CAN) ID: CVE-2010-0743

Linux SCSI Target Framework(tgt)用于简化各种SCSI目标驱动(iSCSI、Fibre Channel、SRP等)的创建和维护工作。

Linux SCSI Target Framework的usr/iscsi/isns.c文件中的isns_attr_query()和qry_rsp_handle()函数存在多个格式串错误,远程攻击者可以通过发送特制的client appearance或client disappearance消息导致tgtd守护程序崩溃。

<*来源:Florent Daigniere (nextgens@freenetproject.org
  
  链接:http://secunia.com/advisories/39142
        https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=576359
        http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=574935
        https://www.redhat.com/support/errata/RHSA-2010-0362.html
        http://www.debian.org/security/2010/dsa-2042
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-2042-1)以及相应补丁:
DSA-2042-1:iscsitarget: Denial of service - Remote/unauthenticated
链接:http://www.debian.org/security/2010/dsa-2042

补丁下载:
Source archives:

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1.dsc
Size/MD5 checksum:     1193 df8ae44c0366731c4102f1c5290f6c15
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162.orig.tar.gz
Size/MD5 checksum:   354607 7105541d6b64f75852a725bcc26636bf
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1.diff.gz
Size/MD5 checksum:     6743 d529b9d00d84471b032a425596ee63fe

Architecture independent packages:

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget-source_0.4.16+svn162-3.1+lenny1_all.deb
Size/MD5 checksum:    42926 006bfefbd074b9dbf72843ef643ff8df

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_alpha.deb
Size/MD5 checksum:    67210 14b0bdb4c8ec37cbafdea7794e23abd8

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_amd64.deb
Size/MD5 checksum:    60612 109ce97790e712a34de0f35900013b4c

arm architecture (ARM)

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_arm.deb
Size/MD5 checksum:    56720 18811f116a76d7313a2a3a28110cf826

armel architecture (ARM EABI)

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_armel.deb
Size/MD5 checksum:    54884 3e461faf8c4894b16ca5ef30fe984f9d

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_hppa.deb
Size/MD5 checksum:    61690 e782044016a48646e518672dab64fa38

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_i386.deb
Size/MD5 checksum:    55872 4b76ecbc8b77f188fddeb22c85340730

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_ia64.deb
Size/MD5 checksum:    78788 64e434cc92a5c15464bbd686cf42b5e5

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_mips.deb
Size/MD5 checksum:    60938 4bd9648a4d57aebbf988bd109d50db31

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_mipsel.deb
Size/MD5 checksum:    60864 7f6bae57597af59dec08361837b52e6a

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_powerpc.deb
Size/MD5 checksum:    63610 1c2e92e14e5880718638fc4f73e35e3f

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_s390.deb
Size/MD5 checksum:    60210 5ad590f73d54b0524c95e9281e30a2ae

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_sparc.deb
Size/MD5 checksum:    55122 1ddde4c48656b1db8121312202d40c76

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2010:0362-01)以及相应补丁:
RHSA-2010:0362-01:Important: scsi-target-utils security update
链接:https://www.redhat.com/support/errata/RHSA-2010-0362.html

FUJITA Tomonori
---------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://git.kernel.org/?p=linux/kernel/git/tomo/tgt.git;a=commitdiff;h=107d922706cd36f3bb79bcca9bc4678c32f22e59

iSCSI Enterprise Target
-----------------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://sourceforge.net/projects/iscsitarget/

浏览次数:3356
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障