Lucene search

K
cve[email protected]CVE-2022-1355
HistoryAug 31, 2022 - 4:15 p.m.

CVE-2022-1355

2022-08-3116:15:09
CWE-119
CWE-121
web.nvd.nist.gov
119
8
cve-2022-1355
libtiffs
tiffcp
stack buffer overflow
denial of service

6.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.4%

A stack buffer overflow flaw was found in Libtiffs’ tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.

Affected configurations

NVD
Node
libtifflibtiffRange<4.4.0
Node
fedoraprojectfedoraMatch34
OR
fedoraprojectfedoraMatch35
OR
fedoraprojectfedoraMatch36
Node
redhatenterprise_linuxMatch7.0
OR
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
Node
netappontap_select_deploy_administration_utilityMatch-
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
CPENameOperatorVersion
libtiff:libtifflibtifflt4.4.0

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "libtiff",
    "versions": [
      {
        "version": "Not-Known",
        "status": "affected"
      }
    ]
  }
]

Social References

More

6.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.4%