GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must process a specially crafted SVG file containing an UNC path on Windows.
{ "vanir_signatures": [ { "deprecated": false, "signature_type": "Function", "source": "https://github.com/imagemagick/rsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd", "target": { "file": "rsvg-io.c", "function": "_rsvg_io_get_file_path" }, "signature_version": "v1", "digest": { "function_hash": "286195117430778398300004990827169289423", "length": 459.0 }, "id": "CVE-2018-1000041-1102b600" }, { "deprecated": false, "signature_type": "Line", "source": "https://github.com/imagemagick/rsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd", "target": { "file": "rsvg-io.c" }, "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "86022843286549888837123888105820422322", "259425425816889724692286720210443290915", "334295550670766026233948921873805680696", "46920378987764707177351963029730365800" ] }, "id": "CVE-2018-1000041-b44f622c" } ] }