First published: Tue Jul 19 2022(Updated: )
Amazon Linux is vulnerable to a denial of service, caused by improper input validation by the memset() function within TIFFFetchStripThing() in tif_dirread.c. By persuading a victim to open a specially-crafted TIFF file, a remote attacker could exploit this vulnerability to cause the application to crash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | =4.0.3-35 | |
Amazon Linux 2 | ||
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-34266.
The severity of CVE-2022-34266 is medium with a CVSS score of 5.5.
The libtiff-4.0.3-35.amzn2.0.1 package for LibTIFF on Amazon Linux 2 is affected by CVE-2022-34266.
CVE-2022-34266 causes a denial of service by triggering an application crash through the passing of an invalid range argument to the memset() function within T.
Yes, you can find more information about CVE-2022-34266 at the following links: [ALAS-2022-1814](https://alas.aws.amazon.com/AL2/ALAS-2022-1814.html) and [Gentoo Bugzilla 859433](https://bugs.gentoo.org/859433).