A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.
The product reads data past the end, or before the beginning, of the intended buffer.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2074404 | patch exploit third party advisory issue tracking |
https://gitlab.com/libtiff/libtiff/-/issues/319 | patch exploit third party advisory issue tracking |
https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798 | patch |
https://access.redhat.com/security/cve/CVE-2022-1354 | third party advisory issue tracking |
https://security.netapp.com/advisory/ntap-20221014-0007/ | third party advisory |
https://security.gentoo.org/glsa/202210-10 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html | third party advisory mailing list |
https://www.debian.org/security/2023/dsa-5333 | third party advisory vendor advisory |