saned in sane-backends 1.0.7 and earlier does not check the IP address of the connecting host during the SANE_NET_INIT RPC call, which allows remote attackers to use that call even if they are restricted in saned.conf.
http://www.securityfocus.com/bid/8595
http://www.securityfocus.com/bid/8593
http://www.redhat.com/support/errata/RHSA-2003-285.html
http://www.redhat.com/support/errata/RHSA-2003-278.html
http://www.novell.com/linux/security/advisories/2003_046_sane.html
http://www.mandriva.com/security/advisories?name=MDKSA-2003:099