GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must process a specially crafted SVG file containing an UNC path on Windows.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1278-1 librsvg security update
EUVD EUVD EUVD-2018-1802 GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must process a specially crafted SVG file containing an UNC path on Windows.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T12:33:48.985Z

Reserved: 2018-02-05T00:00:00

Link: CVE-2018-1000041

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-02-09T23:29:01.260

Modified: 2024-11-21T03:39:30.220

Link: CVE-2018-1000041

cve-icon Redhat

Severity : Low

Publid Date: 2018-06-07T00:00:00Z

Links: CVE-2018-1000041 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses