CVE-2011-0001

Source
https://nvd.nist.gov/vuln/detail/CVE-2011-0001
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-0001.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-0001
Related
Published
2011-03-15T17:55:02Z
Modified
2024-11-21T01:23:05Z
Summary
[none]
Details

Double free vulnerability in the iscsirxhandler function (usr/iscsi/iscsid.c) in the tgt daemon (tgtd) in Linux SCSI target framework (tgt) before 1.0.14, aka scsi-target-utils, allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown vectors related to a buffer overflow during iscsi login. NOTE: some of these details are obtained from third party information.

References

Affected packages

Debian:11 / tgt

Package

Name
tgt
Purl
pkg:deb/debian/tgt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.0.4-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / tgt

Package

Name
tgt
Purl
pkg:deb/debian/tgt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.0.4-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / tgt

Package

Name
tgt
Purl
pkg:deb/debian/tgt?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.0.4-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}