First published: Thu Jun 30 2022(Updated: )
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | <=4.1.0+git191117-2~deb10u4 | 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.2.0-1+deb11u5 4.5.0-6+deb12u1 4.5.1+git230720-3 |
Libtiff Libtiff | =4.4.0 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2057 is a vulnerability in the libtiff library that allows attackers to cause a denial-of-service by exploiting a Divide By Zero error in the tiffcrop utility.
CVE-2022-2057 has a severity level of medium, with a CVSS score of 6.5.
Versions 4.4.0 of libtiff are affected by CVE-2022-2057.
Attackers can exploit CVE-2022-2057 by crafting a malicious TIFF file that triggers the Divide By Zero error in the tiffcrop utility, leading to a denial-of-service condition.
The fix for CVE-2022-2057 is available with commit f3a5e010 if you compile libtiff from sources.