First published: Wed Jun 24 2020(Updated: )
An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-083.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/sane-backends | <1.0.27-1~ | 1.0.27-1~ |
ubuntu/sane-backends | <1.0.29-0ubuntu5.1 | 1.0.29-0ubuntu5.1 |
ubuntu/sane-backends | <1.0.30 | 1.0.30 |
ubuntu/sane-backends | <1.0.25+ | 1.0.25+ |
debian/sane-backends | 1.0.31-4.1 1.2.1-2 1.3.0-1 | |
Sane-backends | <1.0.30 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Debian Linux | =9.0 | |
SUSE Linux | =15.1 | |
SUSE Linux | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12863 is classified as a high severity vulnerability due to its potential for exploitation through out-of-bounds reads.
To fix CVE-2020-12863, upgrade to SANE Backends version 1.0.30 or later, depending on your specific distribution.
CVE-2020-12863 affects SANE Backends versions prior to 1.0.30 across various Linux distributions including Ubuntu and Debian.
Yes, CVE-2020-12863 can be exploited by a malicious device on the same local network as the vulnerable system.
CVE-2020-12863 may allow an attacker to read sensitive data such as ASLR offsets of the program.