Think you have a false positive on this rule?

Sid 1-31590

Message

PROTOCOL-SERVICES Linux iscsiaddnotunderstood_response request buffer overflow attempt

Summary

Heap-based buffer overflow in the iscsiaddnotunderstoodresponse function in drivers/target/iscsi/iscsitarget_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.

Impact

CVSS base score 7.9 CVSS impact score 10.0 CVSS exploitability score 5.5 confidentialityImpact COMPLETE integrityImpact COMPLETE availabilityImpact COMPLETE

CVE-2013-2850:

CVSS base score 7.9

CVSS impact score 10.0

CVSS exploitability score 5.5

Confidentiality Impact COMPLETE

Integrity Impact COMPLETE

Availability Impact COMPLETE

Detailed information

CVE-2013-2850: Heap-based buffer overflow in the iscsiaddnotunderstoodresponse function in drivers/target/iscsi/iscsitarget_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.

Affected systems

  • linux linux_kernel 3.9
  • linux linux_kernel 3.9.0
  • linux linux_kernel 3.9.1
  • linux linux_kernel 3.9.2
  • linux linux_kernel 3.9.3
  • linux linux_kernel 3.9.4

Ease of attack

CVE-2013-2850:

Access Vector ADJACENT_NETWORK

Access Complexity MEDIUM

Authentication NONE

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References

  • seclists.org/oss-sec/2013/q2/448