First published: Mon Mar 20 2017(Updated: )
saned in sane-backends 1.0.25 allows remote attackers to obtain sensitive memory information via a crafted SANE_NET_CONTROL_OPTION packet.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/sane-backends | <1.0.25-4 | 1.0.25-4 |
ubuntu/sane-backends | <1.0.25+ | 1.0.25+ |
debian/sane-backends | 1.0.31-4.1 1.2.1-2 1.3.0-1 | |
openSUSE | =42.1 | |
SANE Project SANE Backends | =1.0.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6318 is considered a high-severity vulnerability due to the potential for remote attackers to access sensitive memory information.
To remediate CVE-2017-6318, upgrade the sane-backends package to versions 1.0.31-4.1, 1.2.1-2, or 1.3.0-1 as applicable for your operating system.
CVE-2017-6318 affects sane-backends version 1.0.25.
Yes, CVE-2017-6318 can be exploited remotely through a crafted SANE_NET_CONTROL_OPTION packet.
CVE-2017-6318 impacts systems running sane-backends version 1.0.25, particularly in Ubuntu, Debian, and openSUSE environments.