CentOS 5 : scsi-target-utils (CESA-2011:0332)

medium Nessus Plugin ID 53426

Synopsis

The remote CentOS host is missing a security update.

Description

An updated scsi-target-utils package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

The scsi-target-utils package contains the daemon and tools to set up and monitor SCSI targets. Currently, iSCSI software and iSER targets are supported.

A double-free flaw was found in scsi-target-utils' tgtd daemon. A remote attacker could trigger this flaw by sending carefully-crafted network traffic, causing the tgtd daemon to crash. (CVE-2011-0001)

Red Hat would like to thank Emmanuel Bouillon of NATO C3 Agency for reporting this issue.

All scsi-target-utils users should upgrade to this updated package, which contains a backported patch to correct this issue. All running scsi-target-utils services must be restarted for the update to take effect.

Solution

Update the affected scsi-target-utils package.

See Also

http://www.nessus.org/u?5cb13052

http://www.nessus.org/u?26427f9e

Plugin Details

Severity: Medium

ID: 53426

File Name: centos_RHSA-2011-0332.nasl

Version: 1.11

Type: local

Agent: unix

Published: 4/15/2011

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:centos:centos:5, p-cpe:/a:centos:centos:scsi-target-utils

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Patch Publication Date: 4/14/2011

Vulnerability Publication Date: 3/15/2011

Reference Information

CVE: CVE-2011-0001

RHSA: 2011:0332