First published: Wed Mar 09 2022(Updated: )
A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 | |
tiff | >=3.9.0<=4.3.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
Fedora | =35 | |
Fedora | =36 | |
NetApp Active IQ Unified Manager for VMware vSphere |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0891 is a high severity vulnerability due to the potential for heap buffer overflow leading to application crashes or information disclosure.
To fix CVE-2022-0891, update the affected software to the latest patched version as per the vendor's recommendations.
CVE-2022-0891 affects the libtiff library versions from 3.9.0 to 4.3.0, as well as specific versions of IBM Cognos Analytics and Debian distributions.
CVE-2022-0891 does not directly lead to remote code execution but can result in unsafe memory access that may compromise application integrity.
You can determine vulnerability to CVE-2022-0891 by checking the version of libtiff and other affected software against the listed vulnerable versions.