saned in sane-backends 1.0.25 allows remote attackers to obtain sensitive memory information via a crafted SANE_NET_CONTROL_OPTION packet.
References
Link | Resource |
---|---|
http://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035054.html | Issue Tracking Mailing List Third Party Advisory |
http://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035059.html | Issue Tracking Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2017-03/msg00016.html | Third Party Advisory |
http://www.securityfocus.com/bid/97028 | |
https://alioth.debian.org/tracker/index.php?func=detail&aid=315576 | Issue Tracking Third Party Advisory |
https://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035029.html | Issue Tracking Third Party Advisory |
https://usn.ubuntu.com/4470-1/ |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-03-20T16:00:00
Updated: 2020-09-01T13:06:05
Reserved: 2017-02-24T00:00:00
Link: CVE-2017-6318
JSON object: View
NVD Information
Status : Modified
Published: 2017-03-20T16:59:02.343
Modified: 2020-09-01T14:15:11.017
Link: CVE-2017-6318
JSON object: View
Redhat Information
No data.
CWE