GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must process a specially crafted SVG file containing an UNC path on Windows.
[
{
"digest": {
"length": 459.0,
"function_hash": "286195117430778398300004990827169289423"
},
"target": {
"file": "rsvg-io.c",
"function": "_rsvg_io_get_file_path"
},
"deprecated": false,
"id": "CVE-2018-1000041-1102b600",
"signature_version": "v1",
"source": "https://github.com/imagemagick/rsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd",
"signature_type": "Function"
},
{
"digest": {
"line_hashes": [
"86022843286549888837123888105820422322",
"259425425816889724692286720210443290915",
"334295550670766026233948921873805680696",
"46920378987764707177351963029730365800"
],
"threshold": 0.9
},
"target": {
"file": "rsvg-io.c"
},
"deprecated": false,
"id": "CVE-2018-1000041-b44f622c",
"signature_version": "v1",
"source": "https://github.com/imagemagick/rsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd",
"signature_type": "Line"
}
]