A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2022-1355 Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2074415 Exploit Issue Tracking Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/400 Exploit Issue Tracking Patch Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/merge_requests/323 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202210-10 Third Party Advisory
https://security.netapp.com/advisory/ntap-20221014-0007/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5333 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2022-08-31T00:00:00

Updated: 2023-01-30T00:00:00

Reserved: 2022-04-14T00:00:00


Link: CVE-2022-1355

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-08-31T16:15:09.577

Modified: 2023-02-23T15:52:46.557


Link: CVE-2022-1355

JSON object: View

cve-icon Redhat Information

No data.