Description
libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write. An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters) could cause a crash or in some cases, further exploitation.
References (3)
Core 3
Core References
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5333
Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2118847
Scores
CVSS v3
5.5
EPSS
0.0002
EPSS Percentile
3.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
CWE-191
CWE-787
Status
published
Products (5)
debian/debian_linux
10.0
debian/debian_linux
11.0
fedoraproject/fedora
35
fedoraproject/fedora
36
libtiff/libtiff
< 4.4.0
Published
Aug 17, 2022
Tracked Since
Feb 18, 2026