CVE-2023-1570

LOW

syoyo tinydng - Heap-Based Buffer Overflow

Title source: llm
STIX 2.1

Description

A vulnerability, which was classified as problematic, has been found in syoyo tinydng. Affected by this issue is the function __interceptor_memcpy of the file tiny_dng_loader.h. The manipulation leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. It is recommended to apply a patch to fix this issue. VDB-223562 is the identifier assigned to this vulnerability.

References (5)

Core 5
Core References
Third Party Advisory vdb-entry technical-description
https://vuldb.com/?id.223562
Permissions Required, Third Party Advisory signature permissions-required
https://vuldb.com/?ctiid.223562
Exploit, Issue Tracking, Patch, Vendor Advisory issue-tracking
https://github.com/syoyo/tinydng/issues/28
Exploit, Issue Tracking, Vendor Advisory issue-tracking
https://github.com/syoyo/tinydng/issues/29

Scores

CVSS v3 3.3
EPSS 0.0017
EPSS Percentile 38.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Details

CWE
CWE-122
Status published
Products (1)
tinydng_project/tinydng < 2023-02-20
Published Mar 22, 2023
Tracked Since Feb 18, 2026