Untriaged
Permalink
CVE-2026-4775
7.8 HIGH
- CVSS version (CVSS): 3.1
- Attack Vector (AV): Local (L)
- Attack Complexity (AC): Low (L)
- Privileges Required (PR): None (N)
- User Interaction (UI): Required (R)
- Scope (S): Unchanged (U)
- Confidentiality (C): High (H)
- Integrity (I): High (H)
- Availability (A): High (H)
- Modified Attack Vector (MAV): Local (L)
- Modified Attack Complexity (MAC): Low (L)
- Modified Privileges Required (MPR): None (N)
- Modified User Interaction (MUI): Required (R)
- Modified Confidentiality (MC): High (H)
- Modified Scope (MS): Unchanged (U)
- Modified Integrity (MI): High (H)
- Modified Availability (MA): High (H)
Activity log
- Created suggestion
Libtiff: libtiff: arbitrary code execution or denial of service via signed integer overflow in tiff file processing
A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.
References
Affected products
libtiff
mingw-libtiff
compat-libtiff3
Package maintainers
-
@willcohen Will Cohen
-
@nialov Nikolas Ovaskainen <nikolasovaskainen@gmail.com>
-
@sikmir Nikolay Korotkiy <sikmir@disroot.org>
-
@nh2 Niklas Hambüchen <mail@nh2.me>
-
@l0b0 Victor Engmark <victor@engmark.name>
-
@imincik Ivan Mincik <ivan.mincik@gmail.com>
-
@autra Augustin Trancart <augustin.trancart@gmail.com>