Description
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
Published: 2019-10-14
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2009-1 tiff security update
Debian DLA Debian DLA DLA-2147-1 gdal security update
Debian DSA Debian DSA DSA-4608-1 tiff security update
Debian DSA Debian DSA DSA-4670-1 tiff security update
EUVD EUVD EUVD-2019-7895 tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
Ubuntu USN Ubuntu USN USN-4158-1 LibTIFF vulnerabilities
Ubuntu USN Ubuntu USN USN-5841-1 LibTIFF vulnerabilities
History

Fri, 20 Dec 2024 13:30:00 +0000

Type Values Removed Values Added
References

Subscriptions

Libtiff Libtiff
Osgeo Gdal
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-12-20T13:06:38.532Z

Reserved: 2019-10-14T00:00:00.000Z

Link: CVE-2019-17546

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-14T02:15:11.107

Modified: 2024-12-20T13:15:16.870

Link: CVE-2019-17546

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-08-15T00:00:00Z

Links: CVE-2019-17546 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses