GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must process a specially crafted SVG file containing an UNC path on Windows.
References
Link | Resource |
---|---|
https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea | Third Party Advisory |
https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/02/msg00013.html | Third Party Advisory |
https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea | Third Party Advisory |
https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/02/msg00013.html | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea - Third Party Advisory | |
References | () https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/02/msg00013.html - Third Party Advisory |
Information
Published : 2018-02-09 23:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000041
Mitre link : CVE-2018-1000041
CVE.ORG link : CVE-2018-1000041
JSON object : View
Products Affected
debian
- debian_linux
gnome
- librsvg
CWE