CVE-2017-17840Improper Restriction of Operations within the Bounds of a Memory Buffer in Open-iscsi

Severity
7.8HIGHNVD
EPSS
0.2%
top 63.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 27
Latest updateMay 14

Description

An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

debiandebian/open-iscsi< open-iscsi 2.0.874-5 (bookworm)
Debianopen-iscsi_project/open-iscsi< 2.0.874-5+3

🔴Vulnerability Details

2
GHSA
GHSA-2mfv-hhmv-9rh8: An issue was discovered in Open-iSCSI through 22022-05-14
OSV
CVE-2017-17840: An issue was discovered in Open-iSCSI through 22017-12-27

📋Vendor Advisories

2
Red Hat
iscsi-initiator-utils: Heap-based buffer overflow in process_iscsid_broadcast()2017-12-22
Debian
CVE-2017-17840: open-iscsi - An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can caus...2017

💬Community

2
Bugzilla
CVE-2017-17840 iscsi-initiator-utils: Heap-based buffer overflow in process_iscsid_broadcast() [fedora-all]2017-12-26
Bugzilla
CVE-2017-17840 iscsi-initiator-utils: Heap-based buffer overflow in process_iscsid_broadcast()2017-12-26