Description: | Description:
The remote host is missing an update to sane announced via advisory MDKSA-2003:099.
Several vulnerabilities were discovered in the saned daemon, a part of the sane package, which allows for a scanner to be used remotely. The IP address of the remote host is only checked after the first communication occurs, which causes the saned.conf restrictions to be ignored for the first connection. As well, a connection that is dropped early can cause Denial of Service issues due to a number of differing factors. Finally, a lack of error checking can cause various other unfavourable actions.
The provided packages have been patched to correct the issues. sane, as distributed in Mandrake Linux 9.1 and higher, have versions where the fixes were applied upstream.
Affected versions: 9.0, Corporate Server 2.1
Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2003:099 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0773 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0774 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0775 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0776 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0777 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0778
Risk factor : High
CVSS Score: 7.5
|