First published: Thu Dec 22 2022(Updated: )
A heap out of bounds read vulnerability exists in the handling of IPTC data while parsing TIFF images in OpenImageIO v2.3.19.0. A specially-crafted TIFF file can cause a read of adjacent heap memory, which can leak sensitive process information. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openimageio Openimageio | =2.3.19.0 | |
Debian Debian Linux | =11.0 | |
debian/openimageio | <=2.0.5~dfsg0-1 | 2.0.5~dfsg0-1+deb10u2 2.2.10.1+dfsg-1+deb11u1 2.4.7.1+dfsg-2 2.4.14.0+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41649 is a heap out of bounds read vulnerability in OpenImageIO v2.3.19.0.
The severity of CVE-2022-41649 is critical with a CVSS score of 9.1.
The affected software of CVE-2022-41649 includes OpenImageIO v2.3.19.0 and Debian Linux 11.0.
An attacker can exploit CVE-2022-41649 by providing a specially-crafted TIFF file to trigger a read of adjacent heap memory and potentially leak sensitive process information.
To fix CVE-2022-41649, update to the patched versions of OpenImageIO or the Debian package.