First published: Fri Mar 11 2022(Updated: )
Unchecked Return Value to NULL Pointer Dereference in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f2b656e2.
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
Libtiff Libtiff | =4.3.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
NetApp ONTAP Select Deploy administration utility |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-0907.
The severity rating of CVE-2022-0907 is 5.5 (medium).
The vulnerability CVE-2022-0907 occurs due to an unchecked return value to NULL pointer dereference in tiffcrop in libtiff 4.3.0.
The impact of CVE-2022-0907 is a denial-of-service (DoS) attack caused by a crafted tiff file.
For users that compile libtiff from sources, the fix is available with commit f2b656e2.