{"id":"CVE-2019-14973","details":"_TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavior that is undefined by the applicable C standards. This can, for example, lead to an application crash.","modified":"2026-05-18T05:50:38.455232219Z","published":"2019-08-14T06:15:10.303Z","related":["SUSE-SU-2019:3058-1","SUSE-SU-2020:2744-1","openSUSE-SU-2020:1561-1","openSUSE-SU-2020:1840-1","openSUSE-SU-2024:13381-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"},{"last_affected":"10.0"}],"vendor_product":"debian:debian_linux","cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"fedoraproject:fedora","extracted_events":[{"last_affected":"30"},{"last_affected":"31"}],"cpes":["cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"],"source":"CPE_FIELD"},{"vendor_product":"opensuse:leap","extracted_events":[{"last_affected":"15.1"},{"last_affected":"15.2"}],"cpes":["cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"],"source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63BVT6N5KQPHWOWM4B3I7Z3ODBXUVNPS/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADNPG7JJTRRK22GUVTAFH3GJ6WGKUZJB/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00102.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00023.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00031.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Nov/5"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2020/Jan/32"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4608"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4670"},{"type":"FIX","url":"https://gitlab.com/libtiff/libtiff/merge_requests/90"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/libtiff/libtiff","events":[{"introduced":"0"},{"last_affected":"b8eac98dd0849c3f888518ce5cecc020f8b2991c"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"4.0.10"}],"cpe":"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["v4.0.10","v4.0.9","v4.0.8","v4.0.7","v4.0.6","v4.0.5","v4.0.4","v4.0.4beta","v4.0.3","v4.0.2","v4.0.1","v4.0.0","v4.0.0beta7","v4.0.0alpha6","v4.0.0alpha5","v4.0.0alpha4","v4.0.0alpha","v3.8.2","v3.8.1","v3.8.0","v3.7.4","v3.7.3","v3.7.2","v3.7.1","v3.7.0","v3.7.0beta2","v3.7.0beta","v3.7.0alpha","v3.6.1","v3.6.0","v3.6.0beta2","v3.5.7","v3.5.5","v3.5.4","v3.5.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-14973.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}