{ "id": "CVE-2023-46047", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T05:15:47.500", "lastModified": "2024-05-14T13:52:52.117", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue in Sane 1.2.1 allows a local attacker to execute arbitrary code via a crafted file to the sanei_configure_attach() function. NOTE: this is disputed because there is no expectation that the product should be starting with an attacker-controlled configuration file." }, { "lang": "es", "value": "Un problema en Sane 1.2.1 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo manipulado en la funci\u00f3n sanei_configure_attach(). NOTA: esto est\u00e1 en disputa porque no se espera que el producto comience con un archivo de configuraci\u00f3n controlado por el atacante." } ], "metrics": {}, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jan/64", "source": "cve@mitre.org" }, { "url": "https://gitlab.com/sane-project/backends/-/issues/708", "source": "cve@mitre.org" } ] }