CVE-2022-34526
Summary
| CVE | CVE-2022-34526 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-07-29 23:15:00 UTC |
| Updated | 2023-11-07 03:48:00 UTC |
| Description | A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file parsed by the "tiffsplit" or "tiffcrop" utilities. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] Fedora 36 Update: libtiff-4.4.0-4.fc36 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| [SECURITY] Fedora 36 Update: libtiff-4.4.0-4.fc36 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| CVE-2022-34526 LibTIFF Vulnerability in NetApp Products | NetApp Product Security |
CONFIRM |
security.netapp.com |
|
| Debian -- Security Information -- DSA-5333-1 tiff |
DEBIAN |
www.debian.org |
|
| tiffsplit: stack-buffer-overflow in _TIFFVGetField() (#433) · Issues · libtiff / libtiff · GitLab |
MISC |
gitlab.com |
|
| tiffcrop: global-buffer-overflow in _TIFFVGetField(), another attack vector for CVE-2022-34526 (#486) · Issues · libtiff / libtiff · GitLab |
MISC |
gitlab.com |
|
| [SECURITY] [DLA 3278-1] tiff security update |
MLIST |
lists.debian.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 181488 Debian Security Update for tiff (DLA 3278-1)
- 181520 Debian Security Update for tiff (DSA 5333-1)
- 182662 Debian Security Update for tiff (CVE-2022-34526)
- 199019 Ubuntu Security Notification for LibTIFF Vulnerabilities (USN-5714-1)
- 283016 Fedora Security Update for libtiff (FEDORA-2022-83b9a5bf0f)
- 354326 Amazon Linux Security Advisory for libtiff : ALAS2022-2022-194
- 354588 Amazon Linux Security Advisory for libtiff : ALAS-2022-194
- 355159 Amazon Linux Security Advisory for libtiff : ALAS2023-2023-050
- 502794 Alpine Linux Security Update for tiff
- 503030 Alpine Linux Security Update for tiff
- 503131 Alpine Linux Security Update for tiff
- 505944 Alpine Linux Security Update for tiff
- 672204 EulerOS Security Update for libtiff (EulerOS-SA-2022-2469)
- 672712 EulerOS Security Update for libtiff (EulerOS-SA-2023-1474)
- 672713 EulerOS Security Update for libtiff (EulerOS-SA-2023-1449)
- 672807 EulerOS Security Update for libtiff (EulerOS-SA-2023-1555)
- 672834 EulerOS Security Update for libtiff (EulerOS-SA-2023-1530)
- 672884 EulerOS Security Update for libtiff (EulerOS-SA-2023-1761)
- 672926 EulerOS Security Update for libtiff (EulerOS-SA-2023-1783)
- 752686 SUSE Enterprise Linux Security Update for tiff (SUSE-SU-2022:3679-1)
- 752701 SUSE Enterprise Linux Security Update for tiff (SUSE-SU-2022:3690-1)
- 902612 Common Base Linux Mariner (CBL-Mariner) Security Update for libtiff (10415)
- 902655 Common Base Linux Mariner (CBL-Mariner) Security Update for libtiff (10441)
- 903868 Common Base Linux Mariner (CBL-Mariner) Security Update for libtiff (10441-1)
- 906735 Common Base Linux Mariner (CBL-Mariner) Security Update for libtiff (10415-1)