cve/2019/CVE-2019-1010258.md
2025-09-29 21:09:30 +02:00

19 lines
1.1 KiB
Markdown

### [CVE-2019-1010258](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010258)
![](https://img.shields.io/static/v1?label=Product&message=nanosvg&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=after%20commit%20c1f6e209c16b18b46aa9f45d7e619acf42c29726%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Buffer%20Overflow&color=brightgreen)
### Description
nanosvg library nanosvg after commit c1f6e209c16b18b46aa9f45d7e619acf42c29726 is affected by: Buffer Overflow. The impact is: Memory corruption leading to at least DoS. More severe impact vectors need more investigation. The component is: it's part of a svg processing library. function nsvg__parseColorRGB in src/nanosvg.h / line 1227. The attack vector is: It depends library usage. If input is passed from the network, then network connectivity is enough. Most likely an attack will require opening a specially crafted .svg file.
### POC
#### Reference
- https://0day.work/cve-2019-1000032-memory-corruption-in-nanosvg/
- https://github.com/memononen/nanosvg/issues/136
#### Github
No PoCs found on GitHub currently.