Vulnerability Details : CVE-2020-12867
A NULL pointer dereference in sanei_epson_net_read in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, aka GHSL-2020-075.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2020-12867
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
- cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
- cpe:2.3:o:sane-project:sane_backends:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-12867
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 29 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-12867
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2020-12867
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-12867
-
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html
[security-announce] openSUSE-SU-2020:1798-1: important: Security updateBroken Link;Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html
[security-announce] openSUSE-SU-2020:1791-1: important: Security updateBroken Link;Mailing List;Third Party Advisory
-
https://usn.ubuntu.com/4470-1/
USN-4470-1: sane-backends vulnerabilities | Ubuntu security notices | UbuntuThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/08/msg00029.html
[SECURITY] [DLA 2332-1] sane-backends security updateMailing List;Third Party Advisory
-
https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html
[sane-announce] SANE Backends 1.0.30 security bug fix releaseMailing List;Third Party Advisory
-
https://gitlab.com/sane-project/backends/-/issues/279#issue-1-ghsl-2020-075-null-pointer-dereference-in-sanei_epson_net_read
memory corruption bugs in libsane (#279) · Issues · sane-project / backends · GitLabThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWUVCHURVGGYBEUOBA4PLSNXJVBKHJYJ/
[SECURITY] Fedora 32 Update: mingw-sane-backends-1.0.30-1.fc32 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/10/msg00010.html
[SECURITY] [DLA 2332-2] sane-backends regression updateMailing List;Third Party Advisory
-
https://securitylab.github.com/advisories/GHSL-2020-075-libsane
GHSL-2020-075, GHSL-2020-079, GHSL-2020-080, GHSL-2020-081, GHSL-2020-082, GHSL-2020-083, GHSL-2020-084: Multiple vulnerabilities in SANE Backends (DoS, RCE) - GitHub Security LabExploit;Third Party Advisory
Jump to