安全研究
安全漏洞
Linux SCSI Target Framework远程格式串漏洞
发布日期:2010-03-31
更新日期:2010-04-21
受影响系统:
FUJITA Tomonori Linux SCSI target framework 1.0.3不受影响系统:
FUJITA Tomonori Linux SCSI target framework 0.9.5
iSCSI Enterprise Target iSCSI Enterprise Target 0.4.16
iSCSI Enterprise Target iSCSI Enterprise Target 0.4.15
iSCSI Enterprise Target iSCSI Enterprise Target 0.4.19描述:
BUGTRAQ ID: 39127
CVE(CAN) ID: CVE-2010-0743
Linux SCSI Target Framework(tgt)用于简化各种SCSI目标驱动(iSCSI、Fibre Channel、SRP等)的创建和维护工作。
Linux SCSI Target Framework的usr/iscsi/isns.c文件中的isns_attr_query()和qry_rsp_handle()函数存在多个格式串错误,远程攻击者可以通过发送特制的client appearance或client disappearance消息导致tgtd守护程序崩溃。
<*来源:Florent Daigniere (nextgens@freenetproject.org)
链接:http://secunia.com/advisories/39142
https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=576359
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=574935
https://www.redhat.com/support/errata/RHSA-2010-0362.html
http://www.debian.org/security/2010/dsa-2042
*>
建议:
厂商补丁:
Debian
------
Debian已经为此发布了一个安全公告(DSA-2042-1)以及相应补丁:
DSA-2042-1:iscsitarget: Denial of service - Remote/unauthenticated
链接:http://www.debian.org/security/2010/dsa-2042
补丁下载:
Source archives:
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1.dsc
Size/MD5 checksum: 1193 df8ae44c0366731c4102f1c5290f6c15
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162.orig.tar.gz
Size/MD5 checksum: 354607 7105541d6b64f75852a725bcc26636bf
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1.diff.gz
Size/MD5 checksum: 6743 d529b9d00d84471b032a425596ee63fe
Architecture independent packages:
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget-source_0.4.16+svn162-3.1+lenny1_all.deb
Size/MD5 checksum: 42926 006bfefbd074b9dbf72843ef643ff8df
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_alpha.deb
Size/MD5 checksum: 67210 14b0bdb4c8ec37cbafdea7794e23abd8
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_amd64.deb
Size/MD5 checksum: 60612 109ce97790e712a34de0f35900013b4c
arm architecture (ARM)
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_arm.deb
Size/MD5 checksum: 56720 18811f116a76d7313a2a3a28110cf826
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_armel.deb
Size/MD5 checksum: 54884 3e461faf8c4894b16ca5ef30fe984f9d
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_hppa.deb
Size/MD5 checksum: 61690 e782044016a48646e518672dab64fa38
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_i386.deb
Size/MD5 checksum: 55872 4b76ecbc8b77f188fddeb22c85340730
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_ia64.deb
Size/MD5 checksum: 78788 64e434cc92a5c15464bbd686cf42b5e5
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_mips.deb
Size/MD5 checksum: 60938 4bd9648a4d57aebbf988bd109d50db31
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_mipsel.deb
Size/MD5 checksum: 60864 7f6bae57597af59dec08361837b52e6a
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_powerpc.deb
Size/MD5 checksum: 63610 1c2e92e14e5880718638fc4f73e35e3f
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_s390.deb
Size/MD5 checksum: 60210 5ad590f73d54b0524c95e9281e30a2ae
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/i/iscsitarget/iscsitarget_0.4.16+svn162-3.1+lenny1_sparc.deb
Size/MD5 checksum: 55122 1ddde4c48656b1db8121312202d40c76
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2010:0362-01)以及相应补丁:
RHSA-2010:0362-01:Important: scsi-target-utils security update
链接:https://www.redhat.com/support/errata/RHSA-2010-0362.html
FUJITA Tomonori
---------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://git.kernel.org/?p=linux/kernel/git/tomo/tgt.git;a=commitdiff;h=107d922706cd36f3bb79bcca9bc4678c32f22e59
iSCSI Enterprise Target
-----------------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://sourceforge.net/projects/iscsitarget/
浏览次数:3356
严重程度:0(网友投票)
绿盟科技给您安全的保障
