DEBIAN-CVE-2003-0773

Source
https://security-tracker.debian.org/tracker/CVE-2003-0773
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0773.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2003-0773
Upstream
Published
2003-09-22T04:00:00Z
Modified
2025-09-24T23:48:43.115669Z
Summary
[none]
Details

saned in sane-backends 1.0.7 and earlier does not check the IP address of the connecting host during the SANENETINIT RPC call, which allows remote attackers to use that call even if they are restricted in saned.conf.

References

Affected packages

Debian:11 / sane-backends

Package

Name
sane-backends
Purl
pkg:deb/debian/sane-backends?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / sane-backends

Package

Name
sane-backends
Purl
pkg:deb/debian/sane-backends?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / sane-backends

Package

Name
sane-backends
Purl
pkg:deb/debian/sane-backends?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / sane-backends

Package

Name
sane-backends
Purl
pkg:deb/debian/sane-backends?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}