A flaw was found in sane-backends before version 1.0.30. A heap buffer overflow in esci2_img function may lead to remote code execution. Upstream issue: https://gitlab.com/sane-project/backends/-/issues/279#issue-9-ghsl-2020-084-buffer-overflow-in-esci2_img References: https://gitlab.com/sane-project/backends/-/releases
Created mingw-sane-backends tracking bugs for this issue: Affects: fedora-all [bug 1850604] Created sane-backends tracking bugs for this issue: Affects: fedora-all [bug 1850602]
External References: https://gitlab.com/sane-project/backends/-/issues/279#issue-9-ghsl-2020-084-buffer-overflow-in-esci2_img
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:2902 https://access.redhat.com/errata/RHSA-2020:2902
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-12865
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2020:2967 https://access.redhat.com/errata/RHSA-2020:2967
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:3045 https://access.redhat.com/errata/RHSA-2020:3045
Statement: The vulnerable code is a part of "driver for Epson ESC/I-2 scanners" which was first introduced in sane-backends-1.0.25 (via https://gitlab.com/sane-project/backends/-/commit/d72f4663c0ad6e6f779c15c8baf5f92b675ae19a). Therefore, only versions of sane-backends shipped with Red Hat Enterprise Linux 8 are affected by this flaw.
Mitigation: This flaw can be mitigated by limiting network scanner discovery to a trusted subnet via the "net" configuration in the "/etc/sane.d/epsonds.conf" configuration file. Also, automatic network scanner discovery can be turned off by commenting out the line "net autodiscovery" in the same configuration file.