An issue in Sane 1.2.1 allows a local attacker to execute arbitrary code via a crafted file to the sanei_configure_attach() function. NOTE: this is disputed because there is no expectation that the product should be starting with an attacker-controlled configuration file.
References
Configurations
No configuration.
History
21 Nov 2024, 08:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2024/Jan/64 - | |
References | () https://gitlab.com/sane-project/backends/-/issues/708 - |
22 Aug 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
CWE | CWE-20 |
27 Mar 2024, 12:29
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Mar 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-27 05:15
Updated : 2024-11-21 08:27
NVD link : CVE-2023-46047
Mitre link : CVE-2023-46047
CVE.ORG link : CVE-2023-46047
JSON object : View
Products Affected
No product.
CWE
CWE-20
Improper Input Validation