First published: Tue Apr 12 2022(Updated: )
A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | <4.4.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
NetApp ONTAP Select Deploy administration utility | ||
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/tiff | <=4.1.0+git191117-2~deb10u4 | 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.2.0-1+deb11u5 4.5.0-6+deb12u1 4.5.1+git230720-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1355 is a stack buffer overflow vulnerability found in Libtiff's tiffcp.c in the main() function.
CVE-2022-1355 affects the tiffcp tool in Libtiff, allowing an attacker to trigger a stack buffer overflow issue and potentially cause a denial of service.
Versions 4.1.0+git191117-2~deb10u8, 4.2.0-1+deb11u4, 4.5.0-6, and 4.5.1+git230720-1 of the tiff package in Debian are affected by CVE-2022-1355.
To fix CVE-2022-1355, update the tiff package to version 4.1.0+git191117-2~deb10u8, 4.2.0-1+deb11u4, 4.5.0-6, or 4.5.1+git230720-1.
The Common Weakness Enumeration (CWE) for CVE-2022-1355 is CWE-119.