An issue in Sane 1.2.1 allows a local attacker to execute arbitrary code via a crafted file to the sanei_configure_attach() function. NOTE: this is disputed because there is no expectation that the product should be starting with an attacker-controlled configuration file.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 23 Sep 2025 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sane-project
Sane-project sane Backends |
|
CPEs | cpe:2.3:h:sane-project:sane_backends:-:*:*:*:*:*:*:* cpe:2.3:o:sane-project:sane_backends:1.2.1:*:*:*:*:*:*:* |
|
Vendors & Products |
Sane-project
Sane-project sane Backends |
Thu, 22 Aug 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-20 | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-22T18:06:45.904Z
Reserved: 2023-10-16T00:00:00
Link: CVE-2023-46047

Updated: 2024-08-02T20:37:39.258Z

Status : Analyzed
Published: 2024-03-27T05:15:47.500
Modified: 2025-09-23T01:02:34.633
Link: CVE-2023-46047

No data.

No data.