{"id":"CVE-2017-6887","details":"A boundary error within the \"parse_tiff_ifd()\" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memory corruption via e.g. a specially crafted KDC file with model set to \"DSLR-A100\" and containing multiple sequences of 0x100 and 0x14A TAGs.","modified":"2026-01-30T03:55:56.511043Z","published":"2017-05-16T16:29:00.253Z","related":["MGASA-2017-0223","SUSE-SU-2017:2300-1","openSUSE-SU-2024:10980-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3950"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/98592"},{"type":"ADVISORY","url":"https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251"},{"type":"ADVISORY","url":"https://secuniaresearch.flexerasoftware.com/advisories/75737/"},{"type":"ADVISORY","url":"https://secuniaresearch.flexerasoftware.com/secunia_research/2017-6/"},{"type":"REPORT","url":"https://secuniaresearch.flexerasoftware.com/advisories/75737/"},{"type":"REPORT","url":"https://secuniaresearch.flexerasoftware.com/secunia_research/2017-6/"},{"type":"FIX","url":"https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libraw/libraw","events":[{"introduced":"0"},{"fixed":"d7c3d2cb460be10a3ea7b32e9443a83c243b2251"}]}],"versions":["0.11.0-Release","0.11.1","0.11.2","0.12.0","0.12.1","0.13.0","0.13.1","0.13.2","0.13.3","0.13.4","0.13.5","0.13.6","0.13.7","0.13.8","0.14.0","0.14.1","0.14.2","0.14.3","0.14.4","0.14.5","0.14.6","0.15.0","0.16.0","0.17.0","0.18.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-6887.json","vanir_signatures":[{"signature_type":"Line","deprecated":false,"target":{"file":"internal/dcraw_common.cpp"},"source":"https://github.com/libraw/libraw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251","digest":{"threshold":0.9,"line_hashes":["330483907310885657851638621784502241594","98297358945102826810003107118541587412","13538086109817097211732976274570932189","140070819662391359961719678473990694994","40273550911795736478718628460633290601","242256858762420658105829523284864040693","157899024790148287550800316389812572087","222565264877867960609186580260913843692","40686553183327440519215951091695956570","230815494714399470105896906696210971826","201572566780869375995244731736247661949","145021184640497432325317046080675481440"]},"id":"CVE-2017-6887-07f0dd62","signature_version":"v1"},{"signature_type":"Function","deprecated":false,"target":{"file":"dcraw/dcraw.c","function":"parse_jpeg"},"source":"https://github.com/libraw/libraw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251","digest":{"function_hash":"223952729540945911801236471202363549232","length":836},"id":"CVE-2017-6887-345db300","signature_version":"v1"},{"signature_type":"Line","deprecated":false,"target":{"file":"dcraw/dcraw.c"},"source":"https://github.com/libraw/libraw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251","digest":{"threshold":0.9,"line_hashes":["330483907310885657851638621784502241594","98297358945102826810003107118541587412","13538086109817097211732976274570932189","140070819662391359961719678473990694994","40273550911795736478718628460633290601","242256858762420658105829523284864040693","157899024790148287550800316389812572087","222565264877867960609186580260913843692","40686553183327440519215951091695956570","230815494714399470105896906696210971826","201572566780869375995244731736247661949","145021184640497432325317046080675481440"]},"id":"CVE-2017-6887-3bf7c58f","signature_version":"v1"},{"signature_type":"Function","deprecated":false,"target":{"file":"dcraw/dcraw.c","function":"parse_tiff_ifd"},"source":"https://github.com/libraw/libraw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251","digest":{"function_hash":"270558865765251762118260754155532321526","length":31716},"id":"CVE-2017-6887-62aafd68","signature_version":"v1"},{"signature_type":"Function","deprecated":false,"target":{"file":"internal/dcraw_common.cpp","function":"parse_jpeg"},"source":"https://github.com/libraw/libraw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251","digest":{"function_hash":"223952729540945911801236471202363549232","length":836},"id":"CVE-2017-6887-70b33685","signature_version":"v1"},{"signature_type":"Function","deprecated":false,"target":{"file":"internal/dcraw_common.cpp","function":"parse_tiff_ifd"},"source":"https://github.com/libraw/libraw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251","digest":{"function_hash":"270558865765251762118260754155532321526","length":31716},"id":"CVE-2017-6887-78c14c72","signature_version":"v1"}]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}