CVE-2017-14608

Source
https://cve.org/CVERecord?id=CVE-2017-14608
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-14608.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-14608
Downstream
Related
Published
2017-09-20T17:29:00.510Z
Modified
2026-04-16T04:39:31.965418057Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
[none]
Details

In LibRaw through 0.18.4, an out of bounds read flaw related to kodak65000loadraw has been reported in dcraw/dcraw.c and internal/dcrawcommon.cpp. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.

References

Affected packages

Git / github.com/libraw/libraw

Affected ranges

Type
GIT
Repo
https://github.com/libraw/libraw
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "0.18.4"
        }
    ]
}

Affected versions

0.*
0.12.0
0.13.0
0.13.1
0.13.2
0.13.3
0.13.4
0.13.5
0.13.6
0.14.0
0.14.1
0.14.2
0.14.3
0.14.4
0.14.5
0.14.6
0.15.0
0.16.0
0.17.0
0.18.0
0.18.1
0.18.2
0.18.3
0.18.4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-14608.json"
vanir_signatures
[
    {
        "signature_version": "v1",
        "source": "https://github.com/libraw/libraw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21",
        "digest": {
            "line_hashes": [
                "202157822897561779189183472516495530908",
                "144687929659205114131421584750958499196",
                "334708782772715860409840809220348812915",
                "209885300085744681948805856641535568215",
                "11230180545788369180989943269865665904"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "internal/dcraw_common.cpp"
        },
        "deprecated": false,
        "signature_type": "Line",
        "id": "CVE-2017-14608-1981bad3"
    },
    {
        "signature_version": "v1",
        "source": "https://github.com/libraw/libraw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21",
        "target": {
            "file": "dcraw/dcraw.c"
        },
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "202157822897561779189183472516495530908",
                "144687929659205114131421584750958499196",
                "334708782772715860409840809220348812915",
                "209885300085744681948805856641535568215",
                "11230180545788369180989943269865665904"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "id": "CVE-2017-14608-376f19eb"
    },
    {
        "signature_version": "v1",
        "source": "https://github.com/libraw/libraw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21",
        "digest": {
            "function_hash": "138374478490586344001064023637424054982",
            "length": 496.0
        },
        "target": {
            "function": "kodak_65000_load_raw",
            "file": "dcraw/dcraw.c"
        },
        "deprecated": false,
        "signature_type": "Function",
        "id": "CVE-2017-14608-4c34d868"
    },
    {
        "signature_version": "v1",
        "source": "https://github.com/libraw/libraw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21",
        "digest": {
            "function_hash": "138374478490586344001064023637424054982",
            "length": 496.0
        },
        "target": {
            "function": "kodak_65000_load_raw",
            "file": "internal/dcraw_common.cpp"
        },
        "deprecated": false,
        "signature_type": "Function",
        "id": "CVE-2017-14608-b1f334a2"
    }
]
vanir_signatures_modified
"2026-04-11T04:14:22Z"