← Back to CVEs
CVE-2026-3284
LOW3.3
Description
A vulnerability was found in libvips 8.19.0. Impacted is the function vips_extract_area_build of the file libvips/conversion/extract.c. The manipulation of the argument extract_area results in integer overflow. The attack requires a local approach. The exploit has been made public and could be used. The patch is identified as 24795bb3d19d84f7b6f5ed86451ad556c8f2fe70. It is advisable to implement a patch to correct this issue.
CVE Details
CVSS v3.1 Score3.3
SeverityLOW
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published2/27/2026
Last Modified3/2/2026
Sourcenvd
Honeypot Sightings0
Affected Products
libvips:libvips
Weaknesses (CWE)
CWE-189CWE-190
References
https://github.com/libvips/libvips/(cna@vuldb.com)
https://github.com/libvips/libvips/issues/4879(cna@vuldb.com)
https://github.com/libvips/libvips/pull/4887(cna@vuldb.com)
https://vuldb.com/?ctiid.348013(cna@vuldb.com)
https://vuldb.com/?id.348013(cna@vuldb.com)
https://vuldb.com/?submit.758864(cna@vuldb.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.