GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must process a specially crafted SVG file containing an UNC path on Windows. Upstream patch: https://github.com/GNOME/librsvg/commit/c6ddf2ed4d768fd88adbea2b63f575cd523022ea https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd References: https://lists.debian.org/debian-lts-announce/2018/02/msg00013.html
Created librsvg2 tracking bugs for this issue: Affects: fedora-all [bug 1588843] Created mingw-librsvg2 tracking bugs for this issue: Affects: fedora-all [bug 1588841]
The described vulnerability only affects librsvg on Windows, where UNC path references can lead to the NTLM hash being leaked.
Statement: The described vulnerability only affects librsvg on Windows, where UNC path references can lead to the NTLM hash being leaked.