Summary
Detail | |||
---|---|---|---|
Vendor | Sane | First view | 2001-12-11 |
Product | Sane | Last view | 2003-09-22 |
Version | 1.0.2 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:sane:sane |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5 | 2003-09-22 | CVE-2003-0778 | saned in sane-backends 1.0.7 and earlier, and possibly later versions, does not properly allocate memory in certain cases, which could allow attackers to cause a denial of service (memory consumption). |
5 | 2003-09-22 | CVE-2003-0777 | saned in sane-backends 1.0.7 and earlier, when debug messages are enabled, does not properly handle dropped connections, which can prevent strings from being null terminated and cause a denial of service (segmentation fault). |
7.5 | 2003-09-22 | CVE-2003-0776 | saned in sane-backends 1.0.7 and earlier does not properly "check the validity of the RPC numbers it gets before getting the parameters," with unknown consequences. |
5 | 2003-09-22 | CVE-2003-0775 | saned in sane-backends 1.0.7 and earlier calls malloc with an arbitrary size value if a connection is dropped before the size value has been sent, which allows remote attackers to cause a denial of service (memory consumption or crash). |
7.5 | 2003-09-22 | CVE-2003-0774 | saned in sane-backends 1.0.7 and earlier does not quickly handle connection drops, which allows remote attackers to cause a denial of service (segmentation fault) when invalid memory is accessed. |
7.5 | 2003-09-22 | CVE-2003-0773 | saned in sane-backends 1.0.7 and earlier does not check the IP address of the connecting host during the SANE_NET_INIT RPC call, which allows remote attackers to use that call even if they are restricted in saned.conf. |
2.1 | 2001-12-11 | CVE-2001-0890 | Certain backend drivers in the SANE library 1.0.3 and earlier, as used in frontend software such as XSane, allows local users to modify files via a symlink attack on temporary files. |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
13983 | SANE Library Backend Driver Symlink Arbitrary File Modification |
11781 | sane-backends saned Unspecified Memory Allocation DoS |
11780 | sane-backends saned RPC Number Check Unspecified Issue |
11779 | sane-backends saned Dropped Connection Debug Message DoS |
11778 | sane-backends saned SANE_NET_INIT Memory Consumption DoS |
11777 | sane-backends saned Malloc Arbitrary Size DoS |
11776 | sane-backends saned Connection Mishandling DoS |
OpenVAS Exploits
id | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 379-1 (sane-backends) File : nvt/deb_379_1.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2004-09-29 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-379.nasl - Type: ACT_GATHER_INFO |
2004-07-31 | Name: The remote Mandrake Linux host is missing one or more security updates. File: mandrake_MDKSA-2003-099.nasl - Type: ACT_GATHER_INFO |
2004-07-25 | Name: The remote host is missing a vendor-supplied security patch File: suse_SA_2003_046.nasl - Type: ACT_GATHER_INFO |
2004-07-06 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2003-285.nasl - Type: ACT_GATHER_INFO |