How to Buy
This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated SANE packages that resolve a number of vulnerabilities with
the saned daemon are now available.
SANE is a package for using document scanners.
Sane includes a daemon program (called saned) that enables a single
machine connected to a scanner to be used remotely. This program
contains several vulnerabilities.
NOTE: Although the SANE packages include this program, it is not used
by default under Red Hat Enterprise Linux.
The IP address of the remote host is only checked after the first
communication occurs, causing saned.conf restrictions to be
ineffective for the first communication. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name
CVE-2003-0773 to this issue.
A connection that is dropped early causes one of several problems. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2003-0774, CVE-2003-0775, and CVE-2003-0777 to
Lack of error checking can cause various other unfavorable
consequences. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2003-0776 and CVE-2003-0778
to these issues.
Users of SANE (particularly those that use saned for remote scanner
access) should upgrade to these errata packages, which contain a
backported security patch to resolve these issues.
See also :
Update the affected sane-backends and / or sane-backends-devel
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12423 ()
CVE ID: CVE-2003-0773CVE-2003-0774CVE-2003-0775CVE-2003-0776CVE-2003-0777CVE-2003-0778
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.