A vulnerability, which was classified as problematic, has been found in syoyo tinydng. Affected by this issue is the function __interceptor_memcpy of the file tiny_dng_loader.h. The manipulation leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. It is recommended to apply a patch to fix this issue. VDB-223562 is the identifier assigned to this vulnerability.
References
Link Resource
https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1 Exploit Third Party Advisory
https://github.com/syoyo/tinydng/issues/28 Exploit Issue Tracking Patch Vendor Advisory
https://github.com/syoyo/tinydng/issues/29 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.223562 Permissions Required Third Party Advisory
https://vuldb.com/?id.223562 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: VulDB

Published: 2023-03-22T14:31:03.821Z

Updated: 2023-10-21T10:50:22.427Z

Reserved: 2023-03-22T11:02:30.722Z


Link: CVE-2023-1570

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-03-22T15:15:10.187

Modified: 2024-05-17T02:18:14.430


Link: CVE-2023-1570

JSON object: View

cve-icon Redhat Information

No data.

CWE