Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2020.0360
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2020-0360)
Resumen:The remote host is missing an update for the 'sane' package(s) announced via the MGASA-2020-0360 advisory.
Descripción:Summary:
The remote host is missing an update for the 'sane' package(s) announced via the MGASA-2020-0360 advisory.

Vulnerability Insight:
A heap buffer overflow in SANE Backends before 1.0.30 allows a malicious
device connected to the same local network as the victim to execute arbitrary
code, aka GHSL-2020-080. (CVE-2020-12861)

An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious
device connected to the same local network as the victim to read important
information, such as the ASLR offsets of the program, aka GHSL-2020-082.
(CVE-2020-12862)

An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious
device connected to the same local network as the victim to read important
information, such as the ASLR offsets of the program, aka GHSL-2020-083.
(CVE-2020-12863)

An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious
device connected to the same local network as the victim to read important
information, such as the ASLR offsets of the program, aka GHSL-2020-081.
(CVE-2020-12864)

A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious
device connected to the same local network as the victim to execute arbitrary
code, aka GHSL-2020-084. (CVE-2020-12865)

A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious
device connected to the same local network as the victim to cause a denial of
service, GHSL-2020-079. (CVE-2020-12866)

A NULL pointer dereference in sanei_epson_net_read in SANE Backends before
1.0.30 allows a malicious device connected to the same local network as the
victim to cause a denial of service, aka GHSL-2020-075. (CVE-2020-12867)

Affected Software/OS:
'sane' package(s) on Mageia 7.

Solution:
Please install the updated package(s).

CVSS Score:
7.9

CVSS Vector:
AV:A/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2020-12861
http://packetstormsecurity.com/files/172841/SANE-Backends-Memory-Corruption-Code-Execution.html
https://securitylab.github.com/advisories/GHSL-2020-075-libsane
SuSE Security Announcement: openSUSE-SU-2020:1791 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html
SuSE Security Announcement: openSUSE-SU-2020:1798 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html
https://usn.ubuntu.com/4470-1/
Common Vulnerability Exposure (CVE) ID: CVE-2020-12862
https://lists.debian.org/debian-lts-announce/2020/08/msg00029.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-12863
Common Vulnerability Exposure (CVE) ID: CVE-2020-12864
Common Vulnerability Exposure (CVE) ID: CVE-2020-12865
Common Vulnerability Exposure (CVE) ID: CVE-2020-12866
Common Vulnerability Exposure (CVE) ID: CVE-2020-12867
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWUVCHURVGGYBEUOBA4PLSNXJVBKHJYJ/
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.