Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2022-1622 CVE-2022-1623 CVE-2022-22844 CVE-2022-0907 CVE-2022-2057 CVE-2022-2056 CVE-2022-2058 |
CWE-ID | CWE-125 CWE-476 CWE-369 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
LibTIFF Universal components / Libraries / Libraries used by multiple products |
Vendor | LibTIFF |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU63826
Risk: Medium
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1622
CWE-ID: N/A
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a boundary condition in LZWDecode() function in libtiff/tif_lzw.c:619. A remote attacker can create a specially crafted TIFF file, trick the victim into opening it, trigger out-of-bounds read error and to perform a denial of service attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLibTIFF: 3.4 - 4.3.0
External linkshttp://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
http://gitlab.com/libtiff/libtiff/-/issues/410
http://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63824
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-1623
CWE-ID: N/A
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a boundary condition in LZWDecode() function in libtiff/tif_lzw.c:624. A remote attacker can create a specially crafted TIFF file, trick the victim into opening it, trigger out-of-bounds read error and perform a denial of service attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLibTIFF: 3.4 - 4.3.0
External linkshttp://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
http://gitlab.com/libtiff/libtiff/-/issues/410
http://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63795
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-22844
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a boundary condition in the _TIFFmemcpy() function in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field. A remote attacker can pass a specially crafted file and perform a denial of service attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLibTIFF: 3.9.6 - 4.3.0
External linkshttp://gitlab.com/libtiff/libtiff/-/issues/355
http://gitlab.com/libtiff/libtiff/-/merge_requests/287
http://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
http://security.netapp.com/advisory/ntap-20220311-0002/
http://www.debian.org/security/2022/dsa-5108
http://bugzilla.redhat.com/show_bug.cgi?id=2042603
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU63794
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0907
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in tiffcrop in libtiff. A remote attacker can trigger denial of service conditions via a crafted tiff file.
MitigationInstall update from vendor's website.
Vulnerable software versionsLibTIFF: 3.9.6 - 4.3.0
External linkshttp://gitlab.com/libtiff/libtiff/-/merge_requests/314
http://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0907.json
http://gitlab.com/libtiff/libtiff/-/issues/392
http://www.debian.org/security/2022/dsa-5108
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65441
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-2057
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error when parsing TIFF files in tiffcrop. A remote attacker can trick the victim to open a specially crafted file and crash the affected application. MitigationInstall updates from vendor's website.
Vulnerable software versionsLibTIFF: 4.3.0
External linkshttp://gitlab.com/libtiff/libtiff/-/issues/427
http://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2057.json
http://gitlab.com/libtiff/libtiff/-/merge_requests/346
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65440
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-2056
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The
vulnerability exists due to a division by zero error when parsing TIFF
files in tiffcrop. A remote attacker can trick the victim to open a specially
crafted file and crash the affected application.
Install updates from vendor's website.
Vulnerable software versionsLibTIFF: 4.3.0
External linkshttp://gitlab.com/libtiff/libtiff/-/issues/415
http://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2056.json
http://gitlab.com/libtiff/libtiff/-/merge_requests/346
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU65439
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-2058
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a division by zero error when parsing TIFF files in tiffcrop. A remote attacker can trick the victim to open a specially crafted file and crash the affected application.
Install updates from vendor's website.
Vulnerable software versionsLibTIFF: 4.3.0
External linkshttp://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json
http://gitlab.com/libtiff/libtiff/-/merge_requests/346
http://gitlab.com/libtiff/libtiff/-/issues/428
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.