tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2009-1 tiff security update
Debian DLA Debian DLA DLA-2147-1 gdal security update
Debian DSA Debian DSA DSA-4608-1 tiff security update
Debian DSA Debian DSA DSA-4670-1 tiff security update
EUVD EUVD EUVD-2019-7895 tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
Ubuntu USN Ubuntu USN USN-4158-1 LibTIFF vulnerabilities
Ubuntu USN Ubuntu USN USN-5841-1 LibTIFF vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Dec 2024 13:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-12-20T13:06:38.532Z

Reserved: 2019-10-14T00:00:00

Link: CVE-2019-17546

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-14T02:15:11.107

Modified: 2024-12-20T13:15:16.870

Link: CVE-2019-17546

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-08-15T00:00:00Z

Links: CVE-2019-17546 - Bugzilla

cve-icon OpenCVE Enrichment

No data.