Improper Input Validation in GNOME librsvg Allows Remote Attackers to Gain Sensitive Information
CVE-2018-1000041
8.8HIGH
Summary
GNOME librsvg contains an improper input validation issue within rsvg-io.c that may expose sensitive information to remote attackers. When victims process a maliciously crafted SVG file that includes a UNC path on Windows, their Windows username and NTLM password hash can be leaked through SMB. This vulnerability highlights the importance of secure handling of input files and calls for immediate attention to mitigate potential exploits.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved