{"id":"CVE-2017-16909","details":"An error related to the \"LibRaw::panasonic_load_raw()\" function (dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image.","modified":"2026-04-11T04:37:59.783268Z","published":"2018-12-07T22:29:00.240Z","related":["SUSE-SU-2017:3392-1"],"references":[{"type":"ADVISORY","url":"https://secuniaresearch.flexerasoftware.com/advisories/76000/"},{"type":"ADVISORY","url":"https://secuniaresearch.flexerasoftware.com/secunia_research/2017-19/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3615-1/"},{"type":"ADVISORY","url":"https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt"},{"type":"FIX","url":"https://github.com/LibRaw/LibRaw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libraw/libraw","events":[{"introduced":"0"},{"fixed":"b829580cca716c26e9dc441bb2a64bd56dd3e4c2"},{"fixed":"f1394822a0152ceed77815eafa5cac4e8baab10a"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.18.6"}]}}],"versions":["0.12.0","0.13.0","0.13.1","0.13.2","0.13.3","0.13.4","0.13.5","0.13.6","0.14.0","0.14.1","0.14.2","0.14.3","0.14.4","0.14.5","0.14.6","0.15.0","0.16.0","0.17.0","0.18.0","0.18.1","0.18.2","0.18.3","0.18.4","0.18.5"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]}],"vanir_signatures":[{"signature_version":"v1","source":"https://github.com/libraw/libraw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a","id":"CVE-2017-16909-15a28e08","digest":{"threshold":0.9,"line_hashes":["92598643016869726116496545431955095057","120939618251062345120474030181267199025","175446667405057637735720472319857957960","302434637703157556965875178027127222250","159726733877091668658868407700114082283","47396600157287310090621577509096878652","223381199108772046071832214352090977790","312535190315978562344322721944551004105","303224951040866503772588754584229743146","204119642482237263911818387740019987550","255937820271983562132317266877551480520","69397894438155230848606260908398451734","306518057356109731984525057483905944343","191839667621282678976513721523612474074","90351574205308034742503652561293419314"]},"deprecated":false,"target":{"file":"dcraw/dcraw.c"},"signature_type":"Line"},{"signature_version":"v1","source":"https://github.com/libraw/libraw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a","id":"CVE-2017-16909-20262b75","digest":{"length":67105,"function_hash":"321872447772065613720363512539899803803"},"deprecated":false,"target":{"function":"identify","file":"internal/dcraw_common.cpp"},"signature_type":"Function"},{"signature_version":"v1","source":"https://github.com/libraw/libraw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a","id":"CVE-2017-16909-27811112","digest":{"length":788,"function_hash":"161703518076742467936785774804205186967"},"deprecated":false,"target":{"function":"panasonic_load_raw","file":"internal/dcraw_common.cpp"},"signature_type":"Function"},{"signature_version":"v1","source":"https://github.com/libraw/libraw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a","id":"CVE-2017-16909-44d33ca5","digest":{"threshold":0.9,"line_hashes":["92598643016869726116496545431955095057","120939618251062345120474030181267199025","175446667405057637735720472319857957960","302434637703157556965875178027127222250","159726733877091668658868407700114082283","47396600157287310090621577509096878652","223381199108772046071832214352090977790","312535190315978562344322721944551004105","303224951040866503772588754584229743146","204119642482237263911818387740019987550","255937820271983562132317266877551480520","69397894438155230848606260908398451734","306518057356109731984525057483905944343","191839667621282678976513721523612474074","90351574205308034742503652561293419314"]},"deprecated":false,"target":{"file":"internal/dcraw_common.cpp"},"signature_type":"Line"},{"signature_version":"v1","source":"https://github.com/libraw/libraw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a","id":"CVE-2017-16909-c879941c","digest":{"length":3587,"function_hash":"91992552088826294097603272626590769737"},"deprecated":false,"target":{"function":"parse_fuji","file":"internal/dcraw_common.cpp"},"signature_type":"Function"},{"signature_version":"v1","source":"https://github.com/libraw/libraw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a","id":"CVE-2017-16909-d3f822a1","digest":{"threshold":0.9,"line_hashes":["216092885707465522902309138874404632414","265583112738806107122278279198893038748","86890722005686700908617904553551066285","158063219566602077671404182076737842235"]},"deprecated":false,"target":{"file":"libraw/libraw_const.h"},"signature_type":"Line"},{"signature_version":"v1","source":"https://github.com/libraw/libraw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a","id":"CVE-2017-16909-deff72fb","digest":{"length":67105,"function_hash":"321872447772065613720363512539899803803"},"deprecated":false,"target":{"function":"identify","file":"dcraw/dcraw.c"},"signature_type":"Function"},{"signature_version":"v1","source":"https://github.com/libraw/libraw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a","id":"CVE-2017-16909-e6bbb0f3","digest":{"length":788,"function_hash":"161703518076742467936785774804205186967"},"deprecated":false,"target":{"function":"panasonic_load_raw","file":"dcraw/dcraw.c"},"signature_type":"Function"},{"signature_version":"v1","source":"https://github.com/libraw/libraw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a","id":"CVE-2017-16909-fe95ad3d","digest":{"length":3587,"function_hash":"91992552088826294097603272626590769737"},"deprecated":false,"target":{"function":"parse_fuji","file":"dcraw/dcraw.c"},"signature_type":"Function"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-16909.json","vanir_signatures_modified":"2026-04-11T04:37:59Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}