发布时间: 2024年5月17日
修改时间: 2024年5月17日
An issue in Sane 1.2.1 allows a local attacker to execute arbitrary code via a crafted file to the sanei_configure_attach() function. NOTE: this is disputed because there is no expectation that the product should be starting with an attacker-controlled configuration file.
NVD | openEuler | |
---|---|---|
CVSS评分 | 3.3 | |
Attack Vector | Local | |
Attack Complexity | Low | |
Privileges Required | None | |
User Interaction | Required | |
Scope | Unchanged | |
Confidentiality | None | |
Integrity | None | |
Availability | Low |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-3506 | sane-backends security update | 2024年5月17日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | sane-backends | Fixed |
KY3.4-5A | sane-backends | Fixed |
KY3.5.1 | sane-backends | Fixed |
KY3.5.2 | sane-backends | Fixed |