Wiz Agents & Workflows are here

CVE-2020-12863
Linux Debian vulnerability analysis and mitigation

Overview

An out-of-bounds read vulnerability (CVE-2020-12863) was discovered in SANE Backends before version 1.0.30. The vulnerability, also known as GHSL-2020-083, affects the esci2_check_header function where improper memory handling could allow a malicious device connected to the same local network as the victim to read important information (GitHub Lab, Debian LTS).

Technical details

The vulnerability exists in the esci2_check_header function where sscanf is used to read a number from a message. The function processes a 64-byte stack buffer (rbuf in esci2_cmd) whose contents can be controlled by an attacker. If the attacker fills the buffer with the character '0', sscanf will read beyond the buffer boundaries. When the characters beyond the buffer are valid hexadecimal digits, they are converted to a number and written to the variable 'more', which is then included in the next message sent to the malicious device (GitHub Lab).

Impact

The vulnerability could allow an attacker to read important information, such as the ASLR (Address Space Layout Randomization) offsets of the program. However, the practical impact is considered low severity because the byte immediately following the buffer is usually not a valid hexadecimal digit, which prevents information disclosure from occurring (GitHub Lab).

Mitigation and workarounds

The vulnerability was fixed in SANE Backends version 1.0.30. Various distributions have released security updates to address this issue: Ubuntu has released updates for versions 20.04 LTS (1.0.29-0ubuntu5.1), 18.04 LTS (1.0.27-1~experimental3ubuntu2.3), and 16.04 LTS (1.0.25+git20150528-1ubuntu2.16.04.3) (Ubuntu USN), while Debian released version 1.0.25-4.1+deb9u1 for Debian 9 stretch (Debian LTS).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-33986HIGH7.5
  • WolfiWolfi
  • freerdp2
NoYesMar 30, 2026
CVE-2026-33987HIGH7.1
  • WolfiWolfi
  • freerdp2
NoYesMar 30, 2026
CVE-2026-33995MEDIUM5.3
  • WolfiWolfi
  • libwinpr
NoYesMar 30, 2026
CVE-2026-34881MEDIUM5
  • Linux DebianLinux Debian
  • glance
NoYesMar 31, 2026
CVE-2026-33691N/AN/A
  • Linux DebianLinux Debian
  • modsecurity-crs
NoNoMar 31, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management