VYPR
High severity7.5NVD Advisory· Published Jun 27, 2024· Updated Apr 15, 2026

CVE-2024-24792

CVE-2024-24792

Description

Parsing a corrupt or malicious image with invalid color indices can cause a panic.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Parsing a malicious TIFF image with invalid color indices in Go's x/image/tiff library causes a denial-of-service via panic.

Vulnerability

In the Go package x/image/tiff, when decoding a paletted TIFF image, the parser does not validate color indices against the palette size. A crafted image with indices outside the valid range is successfully parsed but later causes a panic when the At method accesses the color palette [2].

Exploitation

An attacker can trigger the vulnerability by supplying a specially crafted TIFF file. No authentication is required; any application that uses tiff.Decode on untrusted input is affected. The provided reproducer demonstrates a panic with an index out of range error, leading to program termination [2].

Impact

Successful exploitation results in a denial-of-service condition, as the panic crashes the application. The issue is rated CVSS 7.5 (High) [1].

Mitigation

The vulnerability is fixed in a subsequent release of golang.org/x/image. Users should update to the latest version of the package. The Go vulnerability database entry GO-2024-2937 [3] and the associated commit [1] provide details and patches.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
golang.org/x/imageGo
< 0.18.00.18.0

Affected products

22

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.