CVE-2022-1354

MEDIUM

Libtiff < 4.4.0 - Out-of-Bounds Write

Title source: rule
STIX 2.1

Description

A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.

References (8)

Core 8
Core References
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202210-10
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5333
Issue Tracking, Third Party Advisory
https://access.redhat.com/security/cve/CVE-2022-1354
Exploit, Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2074404
Exploit, Issue Tracking, Patch, Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/319

Scores

CVSS v3 5.5
EPSS 0.0005
EPSS Percentile 15.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Details

CWE
CWE-125 CWE-787
Status published
Products (8)
debian/debian_linux 10.0
debian/debian_linux 11.0
fedoraproject/fedora 34
fedoraproject/fedora 35
fedoraproject/fedora 36
libtiff/libtiff < 4.4.0
netapp/ontap_select_deploy_administration_utility
redhat/enterprise_linux 9.0
Published Aug 31, 2022
Tracked Since Feb 18, 2026