CVE-2019-17546

HIGH

Libtiff < 4.1.0 - Integer Overflow

Title source: rule
STIX 2.1

Description

tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.

References (12)

Core 12
Core References
Third Party Advisory x_refsource_misc
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443
Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html
Mailing List mailing-list x_refsource_bugtraq
https://seclists.org/bugtraq/2020/Jan/32
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2020/dsa-4608
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202003-25
Mailing List mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/03/msg00020.html
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2020/dsa-4670

Scores

CVSS v3 8.8
EPSS 0.0037
EPSS Percentile 59.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-190 CWE-787
Status published
Products (2)
libtiff/libtiff < 4.1.0
osgeo/gdal < 3.0.1
Published Oct 14, 2019
Tracked Since Feb 18, 2026