First published: Fri Sep 12 2003(Updated: )
saned in sane-backends 1.0.7 and earlier does not check the IP address of the connecting host during the SANE_NET_INIT RPC call, which allows remote attackers to use that call even if they are restricted in saned.conf.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sane | =1.0.6 | |
Sane | =1.0.8 | |
Sane | =1.0.5 | |
Sane | =1.0.7_beta1 | |
Sane | =1.0.0 | |
Sane | =1.0.7_beta2 | |
Sane-backends | =1.0.10 | |
Sane | =1.0.9 | |
Sane | =1.0.3 | |
Sane | =1.0.1 | |
Sane | =1.0.4 | |
Sane | =1.0.2 | |
Sane | =1.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0773 is classified as a medium severity vulnerability due to unauthorized access risk.
To fix CVE-2003-0773, update to a fixed version of sane-backends, such as 1.0.10 or later.
CVE-2003-0773 affects sane-backends versions 1.0.0 through 1.0.8, including various beta versions.
The potential impacts of CVE-2003-0773 include unauthorized access allowing attackers to perform unauthorized RPC calls.
CVE-2003-0773 is not limited to specific operating systems, as it affects the SANE Project's software across various platforms.