First published: Tue Jul 19 2022(Updated: )
The libtiff-4.0.3-35.amzn2.0.1 package for LibTIFF on Amazon Linux 2 allows attackers to cause a denial of service (application crash), a different vulnerability than CVE-2022-0562. When processing a malicious TIFF file, an invalid range may be passed as an argument to the memset() function within TIFFFetchStripThing() in tif_dirread.c. This will cause TIFFFetchStripThing() to segfault after use of an uninitialized resource.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | =4.0.3-35 | |
Amazon Linux 2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-34266.
The severity of CVE-2022-34266 is medium with a CVSS score of 5.5.
The libtiff-4.0.3-35.amzn2.0.1 package for LibTIFF on Amazon Linux 2 is affected by CVE-2022-34266.
CVE-2022-34266 causes a denial of service by triggering an application crash through the passing of an invalid range argument to the memset() function within T.
Yes, you can find more information about CVE-2022-34266 at the following links: [ALAS-2022-1814](https://alas.aws.amazon.com/AL2/ALAS-2022-1814.html) and [Gentoo Bugzilla 859433](https://bugs.gentoo.org/859433).