{"id":"CVE-2019-14973","details":"_TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavior that is undefined by the applicable C standards. This can, for example, lead to an application crash.","modified":"2026-04-10T04:15:44.652293Z","published":"2019-08-14T06:15:10.303Z","related":["SUSE-SU-2019:3058-1","SUSE-SU-2020:2744-1","openSUSE-SU-2020:1561-1","openSUSE-SU-2020:1840-1","openSUSE-SU-2024:13381-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63BVT6N5KQPHWOWM4B3I7Z3ODBXUVNPS/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADNPG7JJTRRK22GUVTAFH3GJ6WGKUZJB/"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Nov/5"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4670"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00102.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00023.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00031.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2020/Jan/32"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4608"},{"type":"FIX","url":"https://gitlab.com/libtiff/libtiff/merge_requests/90"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/libtiff/libtiff","events":[{"introduced":"0"},{"last_affected":"b8eac98dd0849c3f888518ce5cecc020f8b2991c"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.0.10"}]}}],"versions":["v3.5.3","v3.5.4","v3.5.5","v3.5.7","v3.6.0","v3.6.0beta2","v3.6.1","v3.7.0","v3.7.0alpha","v3.7.0beta","v3.7.0beta2","v3.7.1","v3.7.2","v3.7.3","v3.7.4","v3.8.0","v3.8.1","v3.8.2","v4.0.0","v4.0.0alpha","v4.0.0alpha4","v4.0.0alpha5","v4.0.0alpha6","v4.0.0beta7","v4.0.1","v4.0.10","v4.0.2","v4.0.3","v4.0.4","v4.0.4beta","v4.0.5","v4.0.6","v4.0.7","v4.0.8","v4.0.9"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-14973.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}