{"id":"CVE-2017-6318","details":"saned in sane-backends 1.0.25 allows remote attackers to obtain sensitive memory information via a crafted SANE_NET_CONTROL_OPTION packet.","modified":"2026-04-16T06:16:48.936984202Z","published":"2017-03-20T16:59:02.343Z","related":["SUSE-SU-2017:0713-1","SUSE-SU-2017:0717-1","SUSE-SU-2020:3125-1","openSUSE-SU-2024:11366-1"],"references":[{"type":"WEB","url":"https://usn.ubuntu.com/4470-1/"},{"type":"WEB","url":"http://www.securityfocus.com/bid/97028"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2017-03/msg00016.html"},{"type":"REPORT","url":"https://alioth.debian.org/tracker/index.php?func=detail&aid=315576"},{"type":"REPORT","url":"https://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035029.html"},{"type":"REPORT","url":"http://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035054.html"},{"type":"REPORT","url":"http://lists.alioth.debian.org/pipermail/sane-devel/2017-February/035059.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"1.0.25"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-6318.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}