{"id":"CVE-2018-5805","details":"A boundary error within the \"quicktake_100_load_raw()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to cause a stack-based buffer overflow and subsequently cause a crash.","modified":"2026-04-16T04:33:00.474134147Z","published":"2018-12-07T22:29:00.787Z","related":["SUSE-SU-2019:0002-1","SUSE-SU-2022:1277-1","SUSE-SU-2022:1749-1","openSUSE-SU-2024:11997-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3065"},{"type":"ADVISORY","url":"https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt"},{"type":"ADVISORY","url":"https://secuniaresearch.flexerasoftware.com/advisories/81000/"},{"type":"ADVISORY","url":"https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/"},{"type":"FIX","url":"https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libraw/libraw","events":[{"introduced":"0"},{"fixed":"9f26ce37f5be86ea11bfc6831366558650b1f6ff"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.18.8"}]}}],"versions":["0.12.0","0.13.0","0.13.1","0.13.2","0.13.3","0.13.4","0.13.5","0.13.6","0.14.0","0.14.1","0.14.2","0.14.3","0.14.4","0.14.5","0.14.6","0.15.0","0.16.0","0.17.0","0.18.0","0.18.1","0.18.2","0.18.3","0.18.4","0.18.5","0.18.6","0.18.7"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-5805.json","vanir_signatures_modified":"2026-04-11T14:11:05Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"vanir_signatures":[{"source":"https://github.com/libraw/libraw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff","signature_type":"Line","deprecated":false,"target":{"file":"internal/dcraw_common.cpp"},"digest":{"threshold":0.9,"line_hashes":["72157990115405437072869008142403678089","91095039444715808141075598593361836804","315779188054838010719781762465619906325","260867823482545661855188331808218345790","234857057552208646917438376645131305911","206146214758716778749074330095339348478","247960894787937022536739880342149011721","54330672415625928981528792743779202859","293547207206286871192173772426146880978","9874373981138141896568868911025449957","249788294694743818553041987795189000353","264130181463166165130195137198822619265","146931122158647408271548350055420031602","117494544255263399237070941369421212546","97144473278721834432589579486142339929","3456239808480143829133508580993727315","101678192708612356873560141099496025139"]},"id":"CVE-2018-5805-13bbbe0b","signature_version":"v1"},{"source":"https://github.com/libraw/libraw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff","signature_type":"Function","deprecated":false,"target":{"file":"dcraw/dcraw.c","function":"quicktake_100_load_raw"},"digest":{"length":3893,"function_hash":"81076601981760701772015192067059885823"},"id":"CVE-2018-5805-2b94621f","signature_version":"v1"},{"source":"https://github.com/libraw/libraw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff","signature_version":"v1","deprecated":false,"target":{"file":"internal/dcraw_common.cpp","function":"leaf_hdr_load_raw"},"digest":{"length":979,"function_hash":"299153711777264910194194674493063076714"},"id":"CVE-2018-5805-8b0bfa86","signature_type":"Function"},{"source":"https://github.com/libraw/libraw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff","signature_type":"Function","deprecated":false,"target":{"file":"dcraw/dcraw.c","function":"leaf_hdr_load_raw"},"digest":{"length":979,"function_hash":"299153711777264910194194674493063076714"},"id":"CVE-2018-5805-95887c80","signature_version":"v1"},{"source":"https://github.com/libraw/libraw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff","signature_type":"Line","deprecated":false,"target":{"file":"dcraw/dcraw.c"},"digest":{"threshold":0.9,"line_hashes":["72157990115405437072869008142403678089","91095039444715808141075598593361836804","315779188054838010719781762465619906325","260867823482545661855188331808218345790","234857057552208646917438376645131305911","206146214758716778749074330095339348478","247960894787937022536739880342149011721","54330672415625928981528792743779202859","293547207206286871192173772426146880978","9874373981138141896568868911025449957","249788294694743818553041987795189000353","264130181463166165130195137198822619265","146931122158647408271548350055420031602","117494544255263399237070941369421212546","97144473278721834432589579486142339929","3456239808480143829133508580993727315","101678192708612356873560141099496025139"]},"id":"CVE-2018-5805-9796cb0a","signature_version":"v1"},{"source":"https://github.com/libraw/libraw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff","signature_type":"Function","deprecated":false,"target":{"file":"internal/dcraw_common.cpp","function":"quicktake_100_load_raw"},"digest":{"length":3893,"function_hash":"81076601981760701772015192067059885823"},"id":"CVE-2018-5805-b0ca8c45","signature_version":"v1"},{"source":"https://github.com/libraw/libraw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff","signature_type":"Function","deprecated":false,"target":{"file":"internal/dcraw_common.cpp","function":"identify"},"digest":{"length":61356,"function_hash":"191347036979996368125297428625069425213"},"id":"CVE-2018-5805-f82f3fa4","signature_version":"v1"},{"source":"https://github.com/libraw/libraw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff","signature_type":"Function","deprecated":false,"target":{"file":"dcraw/dcraw.c","function":"identify"},"digest":{"length":61356,"function_hash":"191347036979996368125297428625069425213"},"id":"CVE-2018-5805-fc7560f7","signature_version":"v1"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}