CVE-2026-4775

EUVD-2026-14901
A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 12%
Affected Products (NVD)
VendorProductVersion
libtifflibtiff
-
redhathardened_images
-
debiandebian_linux
11.0
redhatenterprise_linux
6.0
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
redhatenterprise_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tiff
bookworm
vulnerable
bookworm (security)
4.5.0-6+deb12u4
fixed
bullseye
vulnerable
bullseye (security)
4.2.0-1+deb11u8
fixed
forky
4.7.1-2
fixed
sid
4.7.1-2
fixed
trixie
vulnerable
trixie (security)
4.7.0-3+deb13u2
fixed
Red Hat logo
Red Hat Enterprise Linux Releases
Red Hat Product
Release
libtiff
RHEL 8
0:4.0.9-37.el8_10
fixed
RHEL 9
0:4.4.0-15.el9_7.3
fixed
libtiff-devel
RHEL 8
0:4.0.9-37.el8_10
fixed
RHEL 9
0:4.4.0-15.el9_7.3
fixed
libtiff-tools
RHEL 8
0:4.0.9-37.el8_10
fixed
RHEL 9
0:4.4.0-15.el9_7.3
fixed
mingw32-libtiff
RHEL 8
0:4.0.9-4.el8_10
fixed
mingw32-libtiff-static
RHEL 8
0:4.0.9-4.el8_10
fixed
mingw64-libtiff
RHEL 8
0:4.0.9-4.el8_10
fixed
mingw64-libtiff-static
RHEL 8
0:4.0.9-4.el8_10
fixed