Incorrect Calculation of Buffer Size Affecting sammycage/plutosvg package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.21% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-SAMMYCAGEPLUTOSVG-6125577
  • published14 Dec 2023
  • disclosed14 Dec 2023
  • creditW4terf1re

Introduced: 14 Dec 2023

CVE-2023-44709  (opens in a new tab)
CWE-131  (opens in a new tab)

How to fix?

There is no fixed version for sammycage/plutosvg.

Overview

Affected versions of this package are vulnerable to Incorrect Calculation of Buffer Size via the plutosvg_load_from_memory component in the plutosvg.c file. An attacker can execute arbitrary code or cause a denial of service by supplying a crafted input that triggers the overflow.

PoC

#include <plutosvg.h>
#include <stdlib.h>
#include <stdio.h>

int main(int argc, char* argv[])
{
    plutovg_surface_t* surface = plutosvg_load_from_file(argv[1], NULL, 0, 0, 96.0);
    return 0;
}

CVSS Scores

version 3.1