RHEL 2.1 : sane-backends (RHSA-2003:285)

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated SANE packages that resolve a number of vulnerabilities with
the saned daemon are now available.

SANE is a package for using document scanners.

Sane includes a daemon program (called saned) that enables a single
machine connected to a scanner to be used remotely. This program
contains several vulnerabilities.

NOTE: Although the SANE packages include this program, it is not used
by default under Red Hat Enterprise Linux.

The IP address of the remote host is only checked after the first
communication occurs, causing saned.conf restrictions to be
ineffective for the first communication. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name
CVE-2003-0773 to this issue.

A connection that is dropped early causes one of several problems. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2003-0774, CVE-2003-0775, and CVE-2003-0777 to
these issues.

Lack of error checking can cause various other unfavorable
consequences. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2003-0776 and CVE-2003-0778
to these issues.

Users of SANE (particularly those that use saned for remote scanner
access) should upgrade to these errata packages, which contain a
backported security patch to resolve these issues.

See also :


Solution :

Update the affected sane-backends and / or sane-backends-devel

Risk factor :

High / CVSS Base Score : 7.5

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12423 ()

Bugtraq ID:

CVE ID: CVE-2003-0773

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now