Ubuntu Security Notice 1156-1 - It was discovered that tgt incorrectly handled long iSCSI name strings, and invalid PDUs. A remote attacker could exploit this to cause tgt to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 10.10. Emmanuel Bouillon discovered that tgt incorrectly handled certain iSCSI logins. A remote attacker could exploit this to cause tgt to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
ba1826fb855135b0d2f8008bbddbf61f5e8cfb8c9332cbf066bc74d8ac8342db
Mandriva Linux Security Advisory 2010-131 - Multiple format string and buffer overflow vulnerabilities has been found and corrected in iscsitarget. The updated packages have been patched to correct these issues.
ecd3901c966ed1b4f15abd5c9b4936fd8235c79b4f270c0008cda1fca4342fe7
A stack buffer overflow vulnerability exist in iscsitarget, an open implementation of iSCSI Enterprise Target. The vulnerability is caused by insufficient boundary checking while processing iSNS messages. A remote attacker can leverage this vulnerability to inject and execute arbitrary code on a vulnerable system.
6fcd69274daa390cb09aab03d6ff81c49f17f973d50117e842e0491b410fefbd