A vulnerability, which was classified as problematic, has been found in syoyo tinydng. Affected by this issue is the function __interceptor_memcpy of the file tiny_dng_loader.h. The manipulation leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. It is recommended to apply a patch to fix this issue. VDB-223562 is the identifier assigned to this vulnerability.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Link | Tags |
---|---|
https://vuldb.com/?id.223562 | vdb entry third party advisory technical description |
https://vuldb.com/?ctiid.223562 | permissions required signature third party advisory |
https://github.com/syoyo/tinydng/issues/28 | issue tracking patch vendor advisory exploit |
https://github.com/syoyo/tinydng/issues/29 | issue tracking exploit vendor advisory |
https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1 | third party advisory exploit |