{ "schema_version": "1.4.0", "id": "GHSA-mw69-v2cv-29ww", "modified": "2024-04-04T00:39:59Z", "published": "2022-05-24T16:45:45Z", "aliases": [ "CVE-2019-1010258" ], "details": "nanosvg library nanosvg after commit c1f6e209c16b18b46aa9f45d7e619acf42c29726 is affected by: Buffer Overflow. The impact is: Memory corruption leading to at least DoS. More severe impact vectors need more investigation. The component is: it's part of a svg processing library. function nsvg__parseColorRGB in src/nanosvg.h / line 1227. The attack vector is: It depends library usage. If input is passed from the network, then network connectivity is enough. Most likely an attack will require opening a specially crafted .svg file.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010258" }, { "type": "WEB", "url": "https://github.com/memononen/nanosvg/issues/136" }, { "type": "WEB", "url": "https://0day.work/cve-2019-1000032-memory-corruption-in-nanosvg" }, { "type": "WEB", "url": "https://github.com/memononen/nanosvg" } ], "database_specific": { "cwe_ids": [ "CWE-119", "CWE-787" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-05-15T18:29:00Z" } }