First published: Tue Aug 16 2022(Updated: )
In libtiff's tiffcrop (tools/tiffcrop.c) utility, there is a uint32_t underflow that leads to an out-of-bounds read and write. A crafted file could trigger this flaw when certain command line arguments are also supplied. References: 1. <a href="https://gitlab.com/libtiff/libtiff/-/issues/352">https://gitlab.com/libtiff/libtiff/-/issues/352</a> 2. <a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/294/diffs?commit_id=bcf28bb7f630f24fa47701a9907013f3548092cd">https://gitlab.com/libtiff/libtiff/-/merge_requests/294/diffs?commit_id=bcf28bb7f630f24fa47701a9907013f3548092cd</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | <=4.1.0+git191117-2~deb10u4 | 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.2.0-1+deb11u5 4.5.0-6+deb12u1 4.5.1+git230720-3 |
redhat/libtiff | <4.4.0 | 4.4.0 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 | |
Libtiff | <4.4.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2869 is a vulnerability in libtiff's tiffcrop tool that allows an attacker to trigger out-of-bounds read and write by supplying a crafted file to tiffcrop.
CVE-2022-2869 affects libtiff's tiffcrop tool, specifically in the extractContigSamples8bits routine.
The severity of CVE-2022-2869 is medium.
An attacker can exploit CVE-2022-2869 by tricking a user into opening a crafted file with tiffcrop.
Yes, there are fixes available for CVE-2022-2869. Please refer to the official references for the specific fixes.