First published: Fri Mar 11 2022(Updated: )
Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.5.0-6 4.5.1+git230720-1 | |
libtiff | =4.3.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
NetApp ONTAP Select Deploy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0924 is classified as a medium severity vulnerability due to its potential to cause denial-of-service through an out-of-bounds read in the tiffcp tool.
To fix CVE-2022-0924, users should update libtiff to versions later than 4.3.0 or apply the specific patch available in commit 408976c4.
CVE-2022-0924 affects libtiff version 4.3.0 and may also be relevant to certain older versions of Debian and Fedora distributions.
The risk associated with CVE-2022-0924 includes potential denial-of-service attacks from specially crafted TIFF files.
Currently, the best workaround for CVE-2022-0924 is to avoid processing untrusted TIFF files until the software is updated.