saned in sane-backends 1.0.25 allows remote attackers to obtain sensitive memory information via a crafted SANE_NET_CONTROL_OPTION packet.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-updates/2017-03/msg00016.html | third party advisory vendor advisory |
http://www.securityfocus.com/bid/97028 | vdb entry |
https://alioth.debian.org/tracker/index.php?func=detail&aid=315576 | issue tracking third party advisory |
https://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035029.html | issue tracking mailing list third party advisory |
http://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035059.html | issue tracking mailing list third party advisory |
http://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035054.html | issue tracking mailing list third party advisory |
https://usn.ubuntu.com/4470-1/ | vendor advisory |