CVE-2017-17840

EUVD-2017-8987
An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 36%
Affected Products (NVD)
VendorProductVersion
open-iscsi_projectopen-iscsi
𝑥
≤ 2.0.875
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
open-iscsi
bookworm
2.1.8-1
fixed
bullseye
2.1.3-5
fixed
jessie
ignored
sid
2.1.10-1
fixed
stretch
no-dsa
trixie
2.1.10-1
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
open-iscsi
artful
ignored
bionic
not-affected
cosmic
not-affected
trusty
not-affected
xenial
not-affected
zesty
not-affected