CVE-2026-4775

| EUVD-2026-14901 HIGH
2026-03-24 redhat
7.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 24, 2026 - 15:15 vuln.today
EUVD ID Assigned
Mar 24, 2026 - 15:15 euvd
EUVD-2026-14901
CVE Published
Mar 24, 2026 - 14:42 nvd
HIGH 7.8

Description

A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.

Analysis

A signed integer overflow vulnerability exists in the libtiff library's putcontig8bitYCbCr44tile function that leads to out-of-bounds heap writes through incorrect memory pointer calculations. Red Hat Enterprise Linux versions 6, 7, 8, 9, and 10 are confirmed affected. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all RHEL 6, 7, 8, 9, and 10 systems and identify applications using libtiff; communicate vulnerability status to stakeholders. Within 7 days: Implement application-level restrictions on TIFF file uploads/processing where feasible; deploy network segmentation to limit lateral movement from compromised systems; disable TIFF processing in non-critical applications. …

Sign in for detailed remediation steps.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +39
POC: 0

Vendor Status

Debian

tiff
Release Status Fixed Version Urgency
bullseye vulnerable 4.2.0-1+deb11u5 -
bullseye (security) vulnerable 4.2.0-1+deb11u7 -
bookworm, bookworm (security) vulnerable 4.5.0-6+deb12u3 -
trixie (security), trixie vulnerable 4.7.0-3+deb13u1 -
forky, sid vulnerable 4.7.1-1 -
(unstable) fixed (unfixed) -

Share

CVE-2026-4775 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy