LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://gitlab.com/libtiff/libtiff/-/issues/410 | third party advisory exploit |
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a | third party advisory patch |
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json | third party advisory |
https://security.netapp.com/advisory/ntap-20220616-0005/ | third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/ | vendor advisory |
https://security.gentoo.org/glsa/202210-10 | third party advisory vendor advisory |
https://www.debian.org/security/2023/dsa-5333 | third party advisory vendor advisory |