Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-17546
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-14 Oct, 2019 | 02:15
Updated At-20 Dec, 2024 | 13:15

tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

LibTIFF
libtiff
>>libtiff>>Versions before 4.1.0(exclusive)
cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*
osgeo
osgeo
>>gdal>>Versions up to 3.0.1(inclusive)
cpe:2.3:a:osgeo:gdal:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-190Primarynvd@nist.gov
CWE-787Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443cve@mitre.org
Third Party Advisory
https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddfcve@mitre.org
Patch
Third Party Advisory
https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145cve@mitre.org
Patch
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.htmlcve@mitre.org
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00020.htmlcve@mitre.org
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LM5ZW7E3IEW7LT2BPJP7D3RN6OUOE3MX/cve@mitre.org
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M3S4WNIMZ7XSLY2LD5FPRPZMGNUBVKOG/cve@mitre.org
N/A
https://seclists.org/bugtraq/2020/Jan/32cve@mitre.org
N/A
https://security.gentoo.org/glsa/202003-25cve@mitre.org
N/A
https://www.debian.org/security/2020/dsa-4608cve@mitre.org
N/A
https://www.debian.org/security/2020/dsa-4670cve@mitre.org
N/A
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddfaf854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145af854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/11/msg00027.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00020.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LM5ZW7E3IEW7LT2BPJP7D3RN6OUOE3MX/af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M3S4WNIMZ7XSLY2LD5FPRPZMGNUBVKOG/af854a3a-2127-422b-91ae-364da2661108
N/A
https://seclists.org/bugtraq/2020/Jan/32af854a3a-2127-422b-91ae-364da2661108
N/A
https://security.gentoo.org/glsa/202003-25af854a3a-2127-422b-91ae-364da2661108
N/A
https://security.netapp.com/advisory/ntap-20241220-0007/af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.debian.org/security/2020/dsa-4608af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.debian.org/security/2020/dsa-4670af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found