Description
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
References (12)
Core 12
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf
Patch, Third Party Advisory x_refsource_misc
https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145
Third Party Advisory x_refsource_misc
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443
Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.html
Mailing List mailing-list
x_refsource_bugtraq
https://seclists.org/bugtraq/2020/Jan/32
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2020/dsa-4608
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LM5ZW7E3IEW7LT2BPJP7D3RN6OUOE3MX/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M3S4WNIMZ7XSLY2LD5FPRPZMGNUBVKOG/
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/202003-25
Mailing List mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/03/msg00020.html
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2020/dsa-4670
Vendor Advisory
https://security.netapp.com/advisory/ntap-20241220-0007/
Scores
CVSS v3
8.8
EPSS
0.0037
EPSS Percentile
59.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-190
CWE-787
Status
published
Products (2)
libtiff/libtiff
< 4.1.0
osgeo/gdal
< 3.0.1
Published
Oct 14, 2019
Tracked Since
Feb 18, 2026