Description
LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
References (8)
Core 8
Core References
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202210-10
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5333
Third Party Advisory
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json
Patch, Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
Exploit, Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/410
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220616-0005/
Scores
CVSS v3
5.5
EPSS
0.0033
EPSS Percentile
56.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (5)
debian/debian_linux
11.0
fedoraproject/fedora
35
fedoraproject/fedora
36
libtiff/libtiff
4.3.0
netapp/ontap_select_deploy_administration_utility
Published
May 11, 2022
Tracked Since
Feb 18, 2026