First published: Tue Apr 12 2022(Updated: )
A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | <4.4.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Redhat Enterprise Linux | =9.0 | |
NetApp ONTAP Select Deploy administration utility | ||
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/tiff | <=4.1.0+git191117-2~deb10u4 | 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.2.0-1+deb11u5 4.5.0-6+deb12u1 4.5.1+git230720-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1354 is a heap buffer overflow vulnerability found in Libtiff's tiffinfo.c in the TIFFReadRawDataStriped() function.
CVE-2022-1354 can allow an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.
The affected versions of the software are tiff 4.1.0+git191117-2~deb10u8, 4.2.0-1+deb11u4, 4.5.0-6, and 4.5.1+git230720-1.
To fix CVE-2022-1354, update to one of the remedy versions: tiff 4.1.0+git191117-2~deb10u8, 4.2.0-1+deb11u4, 4.5.0-6, or 4.5.1+git230720-1.
You can find more information about CVE-2022-1354 at the following references: 1. [Gitlab issue](https://gitlab.com/libtiff/libtiff/-/issues/319) 2. [Gitlab commit](https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798) 3. [Gitlab commit](https://gitlab.com/libtiff/libtiff/-/commit/7057734d986001b7fd6d2afde9667da7754ff2cc)