LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://gitlab.com/libtiff/libtiff/-/issues/277 | issue tracking exploit vendor advisory |
https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246 | patch |
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json | third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/ | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/ | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/ | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20230331-0001/ | third party advisory |