Filtered by vendor Sane Subscriptions
Filtered by product Sane Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2001-0890 2 Redhat, Sane 3 Linux, Powertools, Sane 2024-08-08 N/A
Certain backend drivers in the SANE library 1.0.3 and earlier, as used in frontend software such as XSane, allows local users to modify files via a symlink attack on temporary files.
CVE-2003-0778 2 Redhat, Sane 4 Enterprise Linux, Linux, Sane and 1 more 2024-08-08 N/A
saned in sane-backends 1.0.7 and earlier, and possibly later versions, does not properly allocate memory in certain cases, which could allow attackers to cause a denial of service (memory consumption).
CVE-2003-0773 2 Redhat, Sane 4 Enterprise Linux, Linux, Sane and 1 more 2024-08-08 N/A
saned in sane-backends 1.0.7 and earlier does not check the IP address of the connecting host during the SANE_NET_INIT RPC call, which allows remote attackers to use that call even if they are restricted in saned.conf.
CVE-2003-0777 2 Redhat, Sane 4 Enterprise Linux, Linux, Sane and 1 more 2024-08-08 N/A
saned in sane-backends 1.0.7 and earlier, when debug messages are enabled, does not properly handle dropped connections, which can prevent strings from being null terminated and cause a denial of service (segmentation fault).
CVE-2003-0774 2 Redhat, Sane 4 Enterprise Linux, Linux, Sane and 1 more 2024-08-08 N/A
saned in sane-backends 1.0.7 and earlier does not quickly handle connection drops, which allows remote attackers to cause a denial of service (segmentation fault) when invalid memory is accessed.
CVE-2003-0775 2 Redhat, Sane 4 Enterprise Linux, Linux, Sane and 1 more 2024-08-08 N/A
saned in sane-backends 1.0.7 and earlier calls malloc with an arbitrary size value if a connection is dropped before the size value has been sent, which allows remote attackers to cause a denial of service (memory consumption or crash).
CVE-2003-0776 2 Redhat, Sane 4 Enterprise Linux, Linux, Sane and 1 more 2024-08-08 N/A
saned in sane-backends 1.0.7 and earlier does not properly "check the validity of the RPC numbers it gets before getting the parameters," with unknown consequences.