First published: Tue Mar 15 2022(Updated: )
Divide By Zero error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f8d0f9aa. <a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/310">https://gitlab.com/libtiff/libtiff/-/merge_requests/310</a> <a href="https://gitlab.com/libtiff/libtiff/-/issues/393">https://gitlab.com/libtiff/libtiff/-/issues/393</a> <a href="https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json">https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0909.json</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libtiff | =4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2064146 is high due to its potential to cause a denial-of-service.
To fix REDHAT-BUG-2064146, users who compile libtiff from sources should apply the fix available in commit f8d0f9aa.
The affected version of libtiff for REDHAT-BUG-2064146 is 4.3.0.
Yes, attackers can exploit REDHAT-BUG-2064146 by using a crafted TIFF file to cause a denial-of-service.
The component responsible for the vulnerability in REDHAT-BUG-2064146 is the tiffcrop function in libtiff.