LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6826, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047 | patch |
https://gitlab.com/libtiff/libtiff/-/issues/413 | patch exploit third party advisory issue tracking |
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3597.json | third party advisory vdb entry |
https://security.netapp.com/advisory/ntap-20230110-0001/ | third party advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html | third party advisory mailing list |
https://www.debian.org/security/2023/dsa-5333 | third party advisory vendor advisory |