In the Linux kernel before 3.1, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption. A flaw was found in the Linux kernel’s implementation of SCSI loopback emulation, where an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in memory corruption. A local attacker could abuse this flaw by corrupting memory on a system where this configuration is present.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center