CVE-2018-1000041

GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must process a specially crafted SVG file containing an UNC path on Windows.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
VendorProductVersion
gnomelibrsvg
𝑥
< 2.41.2
debiandebian_linux
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
librsvg
bullseye (security)
2.50.3+dfsg-1+deb11u1
fixed
bullseye
2.50.3+dfsg-1+deb11u1
fixed
bookworm
2.54.7+dfsg-1~deb12u1
fixed
bookworm (security)
2.54.7+dfsg-1~deb12u1
fixed
sid
2.59.1+dfsg-1
fixed
trixie
2.59.1+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
librsvg
artful
not-affected
xenial
not-affected
trusty
dne