Vulnerabilities > CVE-2020-12867 - NULL Pointer Dereference vulnerability in multiple products
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
A NULL pointer dereference in sanei_epson_net_read in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, aka GHSL-2020-075.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Debian Local Security Checks NASL id DEBIAN_DLA-2231.NASL description Remote denial of service and several memory management issues were fixed in the epson2 driver. For Debian 8 last seen 2020-06-06 modified 2020-06-01 plugin id 136987 published 2020-06-01 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/136987 title Debian DLA-2231-1 : sane-backends security update NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_284813497E204F80AE1EE6BF48D4F17C.NASL description The Sane Project reports : epson2: fixes CVE-2020-12867 (GHSL-2020-075) and several memory management issues found while addressing that CVE epsonds: addresses out-of-bound memory access issues to fix CVE-2020-12862 (GHSL-2020-082) and CVE-2020-12863 (GHSL-2020-083), addresses a buffer overflow fixing CVE-2020-12865 (GHSL-2020-084) and disables network autodiscovery to mitigate CVE-2020-12866 (GHSL-2020-079), CVE-2020-12861 (GHSL-2020-080) and CVE-2020-12864 (GHSL-2020-081). Note that this backend does not support network scanners to begin with. magicolor: fixes a floating point exception and uninitialized data read fixes an overflow in sanei_tcp_read() last seen 2020-06-06 modified 2020-05-29 plugin id 136955 published 2020-05-29 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/136955 title FreeBSD : Sane -- Multiple Vulnerabilities (28481349-7e20-4f80-ae1e-e6bf48d4f17c) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2020-139-01.NASL description New sane packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues. last seen 2020-06-06 modified 2020-05-19 plugin id 136707 published 2020-05-19 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/136707 title Slackware 14.0 / 14.1 / 14.2 / current : sane (SSA:2020-139-01)
References
- https://gitlab.com/sane-project/backends/-/issues/279#issue-1-ghsl-2020-075-null-pointer-dereference-in-sanei_epson_net_read
- https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html
- https://securitylab.github.com/advisories/GHSL-2020-075-libsane
- https://lists.debian.org/debian-lts-announce/2020/08/msg00029.html
- https://usn.ubuntu.com/4470-1/
- https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWUVCHURVGGYBEUOBA4PLSNXJVBKHJYJ/