CVE-2023-1570

A vulnerability, which was classified as problematic, has been found in syoyo tinydng. Affected by this issue is the function __interceptor_memcpy of the file tiny_dng_loader.h. The manipulation leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. It is recommended to apply a patch to fix this issue. VDB-223562 is the identifier assigned to this vulnerability.
References
Link Resource
https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1 Exploit Third Party Advisory
https://github.com/syoyo/tinydng/issues/28 Exploit Issue Tracking Patch Vendor Advisory
https://github.com/syoyo/tinydng/issues/29 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.223562 Permissions Required Third Party Advisory
https://vuldb.com/?id.223562 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:tinydng_project:tinydng:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-03-22 15:15

Updated : 2024-05-17 02:18


NVD link : CVE-2023-1570

Mitre link : CVE-2023-1570

CVE.ORG link : CVE-2023-1570


JSON object : View

Products Affected

tinydng_project

  • tinydng
CWE
CWE-122

Heap-based Buffer Overflow