CVE-2019-17546
Published: 10/14/2019 02:15:11
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
HIGH
CVSS v3: 8.8
CVSS v3: 8.8
Status
DocFilters Release | Package | State | Justification | Comment |
---|---|---|---|---|
25.1 | libtiff (4.6.0) | Not Affected | Code Not Present | 4.6.0 does not match CVE configuration. |
24.4 | libtiff (4.6.0) | Not Affected | Code Not Present | 4.6.0 does not match CVE configuration. |
24.4.0 | libtiff (4.6.0) | Not Affected | Code Not Present | 4.6.0 does not match CVE configuration. |
24.3 | libtiff (4.6.0) | Not Affected | Code Not Present | 4.6.0 does not match CVE configuration. |
24.2.1 | libtiff (4.6.0) | Not Affected | Code Not Present | 4.6.0 does not match CVE configuration. |
24.2 | libtiff (4.6.0) | Not Affected | Code Not Present | 4.6.0 does not match CVE configuration. |
24.1 | libtiff (4.6.0) | Not Affected | Code Not Present | 4.6.0 does not match CVE configuration. |
23.3 | libtiff (4.5.1) | Not Affected | Code Not Present | 4.5.1 does not match CVE configuration. |
23.2.1 | libtiff (4.3.0) | Not Affected | Code Not Present | 4.3.0 does not match CVE configuration. |
23.2 | libtiff (4.3.0) | Not Affected | Code Not Present | 4.3.0 does not match CVE configuration. |
23.1 | libtiff (4.3.0) | Not Affected | Code Not Present | 4.3.0 does not match CVE configuration. |
22.4 | libtiff (4.3.0) | Not Affected | Code Not Present | 4.3.0 does not match CVE configuration. |
22.3 | libtiff (4.3.0) | Not Affected | Code Not Present | 4.3.0 does not match CVE configuration. |
22.2 | libtiff (4.3.0) | Not Affected | Code Not Present | 4.3.0 does not match CVE configuration. |
22.1 | libtiff (4.0.8) | Resolved | patched | |
21.11.1 | libtiff (4.0.8) | Resolved | patched | |
21.11 | libtiff (4.0.8) | Resolved | patched | |
21.8.1 | libtiff (4.0.8) | Resolved | patched | |
21.8 | libtiff (4.0.8) | Resolved | patched | |
21.5.1 | libtiff (4.0.8) | Resolved | patched | |
21.5.0 | libtiff (4.0.8) | Resolved | patched | |
21.2.0 | libtiff (4.0.8) | Resolved | patched | |
11.4.20 | libtiff (4.0.8) | Resolved | patched | |
11.4.19.3667 | libtiff (4.0.8) | Resolved | patched | |
11.4.18.3599 | libtiff (4.0.8) | Resolved | patched | |
11.4.17 | libtiff (4.0.8) | Resolved | patched | |
11.4.16.3445 | libtiff (4.0.8) | Needs Triage | ||
11.4.15.3368 | libtiff (4.0.8) | Needs Triage | ||
11.4.14.3263 | libtiff (4.0.8) | Needs Triage | ||
11.4.13.3179 | libtiff (4.0.8) | Needs Triage | ||
11.4.12.3054 | libtiff (4.0.8) | Needs Triage | ||
11.4.11.3040 | libtiff (4.0.8) | Needs Triage | ||
11.4.11.2990 | libtiff (4.0.8) | Needs Triage | ||
11.4.10.2934 | libtiff (4.0.8) | Needs Triage | ||
11.4.9.2878 | libtiff (4.0.8) | Needs Triage | ||
11.4.8.2822 | libtiff (4.0.8) | Needs Triage |
Severity score breakdown
Attack Complexity
LOW
Attack Vector
NETWORK
Availability Impact
HIGH
Base Score
8.8
Base Severity
HIGH
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Privileges Required
NONE
Scope
UNCHANGED
User Interaction
REQUIRED
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Version
3.1