processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image.
References
Link | Resource |
---|---|
https://gitlab.com/libtiff/libtiff/-/commit/d1b6b9c1b3cae2d9e37754506c1ad8f4f7b646b5 | Patch Third Party Advisory |
https://gitlab.com/libtiff/libtiff/-/issues/488 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00037.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202305-31 | |
https://security.netapp.com/advisory/ntap-20230302-0004/ | |
https://www.debian.org/security/2023/dsa-5333 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-01-23 03:15
Updated : 2023-05-30 06:16
NVD link : CVE-2022-48281
Mitre link : CVE-2022-48281
CVE.ORG link : CVE-2022-48281
JSON object : View
Products Affected
libtiff
- libtiff
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write