Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33809: CWE-400: Uncontrolled Resource Consumption in golang.org/x/image golang.org/x/image/tiff

0
Medium
VulnerabilityCVE-2026-33809cvecve-2026-33809cwe-400
Published: Wed Mar 25 2026 (03/25/2026, 18:24:04 UTC)
Source: CVE Database V5
Vendor/Project: golang.org/x/image
Product: golang.org/x/image/tiff

Description

A maliciously crafted TIFF file can cause image decoding to attempt to allocate up 4GiB of memory, causing either excessive resource consumption or an out-of-memory error.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 19:00:57 UTC

Technical Analysis

CVE-2026-33809 is a resource exhaustion vulnerability classified under CWE-400 found in the golang.org/x/image/tiff package, a Go language library used for decoding TIFF image files. The vulnerability occurs because the TIFF decoder does not properly validate or limit memory allocation requests when processing certain crafted TIFF files. Specifically, an attacker can create a malicious TIFF image that causes the decoder to attempt to allocate up to 4 GiB of memory. This excessive allocation can lead to uncontrolled resource consumption, resulting in out-of-memory errors or application crashes, effectively causing a denial of service (DoS). The vulnerability affects all versions of the package as no patched version is currently available. Exploitation does not require authentication or user interaction; simply processing the malicious TIFF file triggers the issue. While no exploits have been observed in the wild, the flaw poses a significant risk to any Go applications that parse TIFF images using this library. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. The vulnerability primarily threatens availability by exhausting system memory, potentially disrupting services or applications relying on this image processing. The root cause is insufficient validation of input data leading to uncontrolled memory allocation during image decoding. Remediation will involve implementing strict input validation, imposing memory allocation limits, or applying patches once released by the maintainers. Organizations using this package in environments processing untrusted TIFF files should prioritize mitigation to prevent potential denial of service attacks.

Potential Impact

The primary impact of CVE-2026-33809 is denial of service through excessive memory consumption. Applications using the golang.org/x/image/tiff package to decode TIFF images can be forced to allocate up to 4 GiB of memory, which may exhaust system resources, cause application crashes, or degrade performance. This can disrupt services that rely on image processing, including web servers, image manipulation tools, or any backend systems handling TIFF files. The vulnerability does not directly compromise confidentiality or integrity but can significantly affect availability. In environments with limited memory resources or high concurrency, the impact is amplified, potentially leading to broader service outages. Attackers can exploit this by sending crafted TIFF files to vulnerable applications, causing repeated crashes or resource exhaustion. This may be leveraged as part of a larger attack chain to disrupt critical infrastructure or cloud services that process images. The absence of authentication or user interaction requirements lowers the barrier for exploitation, increasing risk. Organizations processing untrusted or user-supplied TIFF images are particularly vulnerable. The impact extends to any sector relying on Go-based image processing, including technology companies, cloud providers, and enterprises handling multimedia content.

Mitigation Recommendations

To mitigate CVE-2026-33809, organizations should implement the following specific measures: 1) Avoid processing untrusted TIFF files with the vulnerable golang.org/x/image/tiff package until a patch is available. 2) Employ strict input validation and sanity checks on TIFF file headers and metadata before decoding to detect and reject suspicious files that request excessive memory allocation. 3) Implement resource limits at the application or container level to cap memory usage during image processing, preventing system-wide exhaustion. 4) Use sandboxing or isolated environments for image decoding to contain potential crashes or resource abuse. 5) Monitor application logs and system metrics for unusual memory spikes or crashes related to TIFF processing. 6) Stay updated with golang.org/x/image project releases and apply patches promptly once available. 7) Consider alternative, more secure TIFF processing libraries if immediate patching is not feasible. 8) Educate developers and security teams about this vulnerability to ensure secure coding and operational practices around image handling. These targeted steps go beyond generic advice by focusing on proactive detection, containment, and patch management specific to this resource exhaustion flaw.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2026-03-23T20:35:32.813Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c42db5f4197a8e3b77dc29

Added to database: 3/25/2026, 6:47:17 PM

Last enriched: 3/25/2026, 7:00:57 PM

Last updated: 3/26/2026, 5:36:54 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses