Description
A vulnerability, which was classified as problematic, has been found in syoyo tinydng. Affected by this issue is the function __interceptor_memcpy of the file tiny_dng_loader.h. The manipulation leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. It is recommended to apply a patch to fix this issue. VDB-223562 is the identifier assigned to this vulnerability.
References (5)
Core 5
Core References
Third Party Advisory vdb-entry
technical-description
https://vuldb.com/?id.223562
Permissions Required, Third Party Advisory signature
permissions-required
https://vuldb.com/?ctiid.223562
Exploit, Issue Tracking, Patch, Vendor Advisory issue-tracking
https://github.com/syoyo/tinydng/issues/28
Exploit, Issue Tracking, Vendor Advisory issue-tracking
https://github.com/syoyo/tinydng/issues/29
Exploit, Third Party Advisory exploit
https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1
Scores
CVSS v3
3.3
EPSS
0.0017
EPSS Percentile
38.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Details
CWE
CWE-122
Status
published
Products (1)
tinydng_project/tinydng
< 2023-02-20
Published
Mar 22, 2023
Tracked Since
Feb 18, 2026