First published: Fri Jul 29 2022(Updated: )
A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file parsed by the "tiffsplit" or "tiffcrop" utilities.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tiff | <=4.1.0+git191117-2~deb10u4 | 4.1.0+git191117-2~deb10u8 4.2.0-1+deb11u4 4.2.0-1+deb11u5 4.5.0-6+deb12u1 4.5.1+git230720-3 |
Libtiff Libtiff | =4.4.0 | |
Fedoraproject Fedora | =36 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
NetApp ONTAP Select Deploy administration utility | ||
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34526 is a stack overflow vulnerability in the _TIFFVGetField function of Tiffsplit v4.4.0.
Attackers can exploit CVE-2022-34526 by using a crafted TIFF file parsed by the 'tiffsplit' or 'tiffcrop' utilities to cause a Denial of Service (DoS) attack.
The severity of CVE-2022-34526 is not mentioned in the available information.
The affected software versions include tiffsplit v4.4.0 and possibly other versions specified in the referenced sources.
To fix CVE-2022-34526, update the 'tiff' package to version 4.5.1+git230720-1 or apply the appropriate remedy provided by the Debian source.