CVE-2022-34526

Name
CVE-2022-34526
Description
A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file parsed by the "tiffsplit" or "tiffcrop" utilities.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://gitlab.com/libtiff/libtiff/-/issues/433
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FC6LWPAEKYJ57LSHX4SBFMLRMLOZTHIJ/
Third Party Advisory https://security.netapp.com/advisory/ntap-20220930-0002/
Exploit https://gitlab.com/libtiff/libtiff/-/issues/486
Mailing List https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
Third Party Advisory https://www.debian.org/security/2023/dsa-5333
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FC6LWPAEKYJ57LSHX4SBFMLRMLOZTHIJ/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libtiff:libtiff:4.4.0:*:*:*:*:*:*:* libtiff == None == 4.4.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status