CVE-2022-0562

Name
CVE-2022-0562
Description
Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://gitlab.com/libtiff/libtiff/-/issues/362
MISC https://gitlab.com/gitlab-org/build/omnibus-mirror/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
CONFIRM https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0562.json
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
Mailing List https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20220318-0001/
Third Party Advisory https://www.debian.org/security/2022/dsa-5108
Third Party Advisory https://security.gentoo.org/glsa/202210-10
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:* libtiff >= 4.0.0 <= 4.3.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status