saned in sane-backends 1.0.25 allows remote attackers to obtain sensitive memory information via a crafted SANE_NET_CONTROL_OPTION packet.
References
Configurations
History
21 Nov 2024, 03:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035054.html - Issue Tracking, Mailing List, Third Party Advisory | |
References | () http://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035059.html - Issue Tracking, Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2017-03/msg00016.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/97028 - | |
References | () https://alioth.debian.org/tracker/index.php?func=detail&aid=315576 - Issue Tracking, Third Party Advisory | |
References | () https://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035029.html - Issue Tracking, Third Party Advisory | |
References | () https://usn.ubuntu.com/4470-1/ - |
Information
Published : 2017-03-20 16:59
Updated : 2024-11-21 03:29
NVD link : CVE-2017-6318
Mitre link : CVE-2017-6318
CVE.ORG link : CVE-2017-6318
JSON object : View
Products Affected
opensuse
- leap
sane-backends_project
- sane-backends
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor