First published: Wed May 11 2022(Updated: )
LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | =4.3.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
NetApp ONTAP Select Deploy administration utility | ||
Debian Debian Linux | =11.0 | |
debian/tiff | 4.1.0+git191117-2~deb10u4 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.2.0-1+deb11u5 4.5.0-6+deb12u1 4.5.1+git230720-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-1623.
The title of this vulnerability is 'LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624 allowing attackers to cause a denial-of-service via a crafted tiff file.'
This vulnerability in LibTIFF allows attackers to cause a denial-of-service by exploiting an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624 using a crafted tiff file.
Attackers can exploit this vulnerability by using a crafted tiff file to trigger an out-of-bounds read in LZWDecode.
Users that compile libtiff from sources can fix this vulnerability by applying the fix available with commit b4e79bfa.