CVE-2022-3970

Name
CVE-2022-3970
Description
A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be. It is recommended to apply a patch to fix this issue. The identifier VDB-213549 was assigned to this vulnerability.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
N/A https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137
N/A https://gitlab.com/libtiff/libtiff/-/commit/227500897dfb07fb7d27f7aa570050e62617e3be
N/A https://vuldb.com/?id.213549
N/A https://oss-fuzz.com/download?testcase_id=5738253143900160
Third Party Advisory https://security.netapp.com/advisory/ntap-20221215-0009/
Mailing List https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html
CONFIRM https://support.apple.com/kb/HT213843
CONFIRM https://support.apple.com/kb/HT213841

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:* libtiff >= None < 2022-11-10
cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:* libtiff >= None < 4.5.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
tiff 3.14-main 4.4.0-r1 Michael Mason <ms13sp@gmail.com> fixed