First published: Wed Mar 27 2024(Updated: )
An issue in Sane 1.2.1 allows a local attacker to execute arbitrary code via a crafted file to the sanei_configure_attach() function. NOTE: this is disputed because there is no expectation that the product should be starting with an attacker-controlled configuration file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SANE Project SANE Backends |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46047 is classified as a local code execution vulnerability that could pose significant risks based on its exploitation.
To fix CVE-2023-46047, ensure that the Sane software is updated to a patched version that mitigates this vulnerability.
CVE-2023-46047 affects users of Sane version 1.2.1 due to the vulnerability in the sanei_configure_attach() function.
No, CVE-2023-46047 requires a local attacker to exploit the vulnerability.
A specific workaround for CVE-2023-46047 is not publicly documented, so updating to the latest version is recommended for protection.