Description
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6826, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
References (6)
Core 6
Core References
Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
Third Party Advisory vendor-advisory
https://www.debian.org/security/2023/dsa-5333
Third Party Advisory, VDB Entry
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3597.json
Exploit, Issue Tracking, Patch, Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/413
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230110-0001/
Scores
CVSS v3
5.5
EPSS
0.0003
EPSS Percentile
8.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-787
Status
published
Products (4)
debian/debian_linux
10.0
debian/debian_linux
11.0
libtiff/libtiff
< 4.4.0
netapp/active_iq_unified_manager
Published
Oct 21, 2022
Tracked Since
Feb 18, 2026