Description
A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.
References (8)
Core 8
Core References
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202210-10
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5333
Issue Tracking, Third Party Advisory
https://access.redhat.com/security/cve/CVE-2022-1354
Exploit, Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2074404
Exploit, Issue Tracking, Patch, Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/319
Third Party Advisory
https://security.netapp.com/advisory/ntap-20221014-0007/
Scores
CVSS v3
5.5
EPSS
0.0005
EPSS Percentile
15.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
CWE-787
Status
published
Products (8)
debian/debian_linux
10.0
debian/debian_linux
11.0
fedoraproject/fedora
34
fedoraproject/fedora
35
fedoraproject/fedora
36
libtiff/libtiff
< 4.4.0
netapp/ontap_select_deploy_administration_utility
redhat/enterprise_linux
9.0
Published
Aug 31, 2022
Tracked Since
Feb 18, 2026