First published: Mon Aug 24 2020(Updated: )
Kritphong Mongkhonvanit discovered that sane-backends incorrectly handled certain packets. A remote attacker could possibly use this issue to obtain sensitive memory information. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-6318) It was discovered that sane-backends incorrectly handled certain memory operations. A remote attacker could possibly use this issue to execute arbitrary code. This issue only applied to Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-12861) It was discovered that sane-backends incorrectly handled certain memory operations. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2020-12862, CVE-2020-12863) It was discovered that sane-backends incorrectly handled certain memory operations. A remote attacker could possibly use this issue to obtain sensitive information. This issue only applied to Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-12864) It was discovered that sane-backends incorrectly handled certain memory operations. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2020-12865) It was discovered that sane-backends incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause a denial of service. This issue only applied to Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-12866) It was discovered that sane-backends incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2020-12867)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libsane1 | <1.0.29-0ubuntu5.1 | 1.0.29-0ubuntu5.1 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/libsane1 | <1.0.27-1~experimental3ubuntu2.3 | 1.0.27-1~experimental3ubuntu2.3 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/libsane | <1.0.25+git20150528-1ubuntu2.16.04.3 | 1.0.25+git20150528-1ubuntu2.16.04.3 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-4470-1 is considered medium due to the potential exposure of sensitive memory information.
To fix USN-4470-1, ensure that you upgrade the libsane1 package to the remedied versions specified in the advisory.
USN-4470-1 specifically affects Ubuntu 16.04 LTS, with some impact on versions 18.04 and 20.04 due to related packages.
The vulnerability USN-4470-1 was discovered by Kritphong Mongkhonvanit.
There is no public knowledge of an exploit actively being used in the wild for USN-4470-1, but the risk of exploitation exists.