CVE-2023-46047

An issue in Sane 1.2.1 allows a local attacker to execute arbitrary code via a crafted file to the sanei_configure_attach() function. NOTE: this is disputed because there is no expectation that the product should be starting with an attacker-controlled configuration file.
Configurations

No configuration.

History

21 Nov 2024, 08:27

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2024/Jan/64 - () http://seclists.org/fulldisclosure/2024/Jan/64 -
References () https://gitlab.com/sane-project/backends/-/issues/708 - () https://gitlab.com/sane-project/backends/-/issues/708 -

22 Aug 2024, 18:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3
CWE CWE-20

27 Mar 2024, 12:29

Type Values Removed Values Added
Summary
  • (es) Un problema en Sane 1.2.1 permite a un atacante local ejecutar código arbitrario a través de un archivo manipulado en la función sanei_configure_attach(). NOTA: esto está en disputa porque no se espera que el producto comience con un archivo de configuración controlado por el atacante.

27 Mar 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-27 05:15

Updated : 2024-11-21 08:27


NVD link : CVE-2023-46047

Mitre link : CVE-2023-46047

CVE.ORG link : CVE-2023-46047


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation