Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045.
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Link | Tags |
---|---|
https://gitlab.com/libtiff/libtiff/-/issues/385 | issue tracking patch exploit third party advisory |
https://gitlab.com/libtiff/libtiff/-/merge_requests/306 | issue tracking patch exploit third party advisory |
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0865.json | vdb entry third party advisory |
https://www.debian.org/security/2022/dsa-5108 | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/ | vendor advisory |
https://security.gentoo.org/glsa/202210-10 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20221228-0008/ | third party advisory |