Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-46052

Опубликовано: 27 мар. 2024
Источник: debian
EPSS Низкий

Описание

Sane 1.2.1 heap bounds overwrite in init_options() from backend/test.c via a long init_mode string in a configuration file. NOTE: this is disputed because there is no expectation that test.c code should be executed with an attacker-controlled configuration file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sane-backendsunfixedpackage

Примечания

  • https://gitlab.com/sane-project/backends/-/issues/709

  • https://gitlab.com/sane-project/backends/-/commit/a92ffb3d978329c29513b0acb98ae7987ec1bed7 (1.3.0)

  • Negligible security impact

EPSS

Процентиль: 18%
0.00055
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
почти 2 года назад

Sane 1.2.1 heap bounds overwrite in init_options() from backend/test.c via a long init_mode string in a configuration file. NOTE: this is disputed because there is no expectation that test.c code should be executed with an attacker-controlled configuration file.

CVSS3: 7.1
nvd
почти 2 года назад

Sane 1.2.1 heap bounds overwrite in init_options() from backend/test.c via a long init_mode string in a configuration file. NOTE: this is disputed because there is no expectation that test.c code should be executed with an attacker-controlled configuration file.

CVSS3: 7.1
github
почти 2 года назад

Sane 1.2.1 heap bounds overwrite in init_options() from backend/test.c via a long init_mode string in a configuration file. NOTE: this is disputed because there is no expectation that test.c code should be executed with an attacker-controlled configuration file.

EPSS

Процентиль: 18%
0.00055
Низкий