GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must process a specially crafted SVG file containing an UNC path on Windows.
References
Link | Resource |
---|---|
https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd | Third Party Advisory |
https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/02/msg00013.html | Third Party Advisory |
Information
Published : 2018-02-09 15:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-1000041
Mitre link : CVE-2018-1000041
JSON object : View
CWE
Products Affected
debian
- debian_linux
gnome
- librsvg