Bug 2142734 (CVE-2022-3570) - CVE-2022-3570 libtiff: heap Buffer overflows in tiffcrop.c
Summary: CVE-2022-3570 libtiff: heap Buffer overflows in tiffcrop.c
Keywords:
Status: NEW
Alias: CVE-2022-3570
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2142735 2143155 2144702 2144700 2144701 2144703
Blocks: 2137106
TreeView+ depends on / blocked
 
Reported: 2022-11-15 06:19 UTC by Dhananjay Arunesh
Modified: 2022-12-22 08:30 UTC (History)
15 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A heap-based buffer overflow flaw was found in Libtiff's tiffcrop utility. This issue occurs during the conversion of a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes an out-of-bound access resulting an application crash, eventually leading to a denial of service.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2022-11-15 06:19:40 UTC
Multiple heap buffer overflows in tiffcrop.c utility in libtiff library Version 4.4.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact

References:
https://gitlab.com/libtiff/libtiff/-/issues/386
https://gitlab.com/libtiff/libtiff/-/commit/bd94a9b383d8755a27b5a1bc27660b8ad10b094c
https://gitlab.com/libtiff/libtiff/-/issues/381
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3570.json

Comment 1 Dhananjay Arunesh 2022-11-15 06:21:59 UTC
Created libtiff tracking bugs for this issue:

Affects: fedora-all [bug 2142735]

Comment 6 Dhananjay Arunesh 2022-11-16 08:27:54 UTC
Created mingw-libtiff tracking bugs for this issue:

Affects: fedora-all [bug 2143155]


Note You need to log in before you can comment on or make changes to this bug.