Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://gitlab.com/libtiff/libtiff/-/issues/278 | third party advisory exploit |
https://gitlab.com/libtiff/libtiff/-/merge_requests/311 | third party advisory patch |
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0924.json | third party advisory |
https://www.debian.org/security/2022/dsa-5108 | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ4E654ZYUUUQNBKYQFXNK2CV3CPWTM2/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNT2GFNRLOMKJ5KXM6JIHKBNBFDVZPD3/ | vendor advisory |
https://security.netapp.com/advisory/ntap-20220506-0002/ | third party advisory |
https://security.gentoo.org/glsa/202210-10 | third party advisory vendor advisory |