First published: Mon Jan 23 2023(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libtiff Libtiff | <=4.5.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/tiff | 4.2.0-1+deb11u5 4.5.0-6+deb12u1 4.5.1+git230720-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48281 is a heap-based buffer overflow vulnerability in LibTIFF through version 4.5.0, which can be exploited via a crafted TIFF image.
CVE-2022-48281 has a severity rating of 7, which is considered high.
In Debian, the Tiff package versions 4.1.0+git191117-2~deb10u8, 4.2.0-1+deb11u4, 4.5.0-6, and 4.5.1+git230720-1 are affected by CVE-2022-48281.
In Ubuntu, the Tiff package versions 4.0.9-5ubuntu0.10+, 4.1.0+, 4.3.0-6ubuntu0.5, 4.0.3-7ubuntu0.11+, 4.5.0-4, and 4.0.6-1ubuntu0.8+ are affected by CVE-2022-48281.
To fix CVE-2022-48281, update LibTIFF to a version that includes the necessary security patches, such as version 4.5.1+git230720-1 in Debian or version 4.1.0+ in Ubuntu.