saned in sane-backends 1.0.25 allows remote attackers to obtain sensitive memory information via a crafted SANE_NET_CONTROL_OPTION packet.
References
Link | Resource |
---|---|
http://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035054.html | Issue Tracking Mailing List Third Party Advisory |
http://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035059.html | Issue Tracking Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2017-03/msg00016.html | Third Party Advisory |
http://www.securityfocus.com/bid/97028 | |
https://alioth.debian.org/tracker/index.php?func=detail&aid=315576 | Issue Tracking Third Party Advisory |
https://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035029.html | Issue Tracking Third Party Advisory |
https://usn.ubuntu.com/4470-1/ |
Configurations
History
No history.
Information
Published : 2017-03-20 16:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-6318
Mitre link : CVE-2017-6318
CVE.ORG link : CVE-2017-6318
JSON object : View
Products Affected
sane-backends_project
- sane-backends
opensuse
- leap
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor