An issue in Sane 1.2.1 allows a local attacker to execute arbitrary code via a crafted file to the sanei_configure_attach() function. NOTE: this is disputed because there is no expectation that the product should be starting with an attacker-controlled configuration file.
[
{
"cpes": [
"cpe:2.3:a:sane-project:sane_backends:1.2.1:*:*:*:*:*:*:*"
],
"vendor": "sane-project",
"product": "sane_backends",
"versions": [
{
"status": "affected",
"version": "1.2.1"
}
],
"defaultStatus": "unknown"
}
]