Description
A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. It is advisable to implement a patch to correct this issue.
Published: 2026-02-27
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local integer overflow
Action: Patch libvips
AI Analysis

Impact

An integer overflow occurs in the vips_extract_area_build function of libvips 8.19.0 when the extract_area argument is manipulated. The CVE description states that the attack requires local access and could be used, indicating that the vulnerability may allow a local attacker to corrupt memory managed by the image processing library. While the description does not explicitly confirm privilege escalation or arbitrary code execution, such outcomes are inferred from the potential for memory corruption and the local attacker scenario.

Affected Systems

The affected product is libvips version 8.19.0. Any build of libvips that has not incorporated the patch identified by commit 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70 remains vulnerable.

Risk and Exploitability

The CVSS score of 4.8 signifies moderate severity, and the EPSS score of less than 1 % indicates a very low likelihood of exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires local access to supply a crafted image that triggers the overflow, so the surface for remote attackers is limited. The risk is primarily to systems that process untrusted images with a local privileged process that could be compromised if exploited.

Generated by OpenCVE AI on April 18, 2026 at 10:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a vendor patch that incorporates commit 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70 by upgrading libvips to a patched version such as 8.19.1 or newer
  • If upgrading cannot occur immediately, limit the use of vips_extract_area_build or enforce additional bounds checks on image dimensions to reduce the chance of an overflow
  • Monitor publicly disclosed exploits and confirm that local environments do not include the vulnerable libvips binary by checking installed versions against the patched revision

Generated by OpenCVE AI on April 18, 2026 at 10:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:libvips:libvips:8.19.0:*:*:*:*:*:*:*

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 03:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. It is advisable to implement a patch to correct this issue.
Title libvips extract.c vips_extract_area_build integer overflow
First Time appeared Libvips
Libvips libvips
Weaknesses CWE-189
CWE-190
CPEs cpe:2.3:a:libvips:libvips:*:*:*:*:*:*:*:*
Vendors & Products Libvips
Libvips libvips
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T18:49:42.929Z

Reserved: 2026-02-26T16:33:08.940Z

Link: CVE-2026-3284

cve-icon Vulnrichment

Updated: 2026-02-27T18:49:39.980Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T03:16:03.167

Modified: 2026-03-02T16:30:59.720

Link: CVE-2026-3284

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:30:35Z

Weaknesses