QID 353984
Date Published: 2022-07-18
QID 353984: Amazon Linux Security Advisory for libtiff : ALAS2-2022-1814
A flaw was found in libtiff where a null source pointer passed as an argument to the memcpy() function within the tiffreaddirectory() in tif_dirread.c.
This flaw allows an attacker to exploit this vulnerability via a crafted tiff file, causing a crash and leading to a denial of service. (
( CVE-2022-0562) a flaw was found in libtiff-4.0.3-35.amzn2.0.1 as packaged on amazon linux 2.
When processing a malicious tiff file, an invalid range may be passed as an argument to the memset() function within tifffetchstripthing() in tif_dirread.c.
This will cause tifffetchstripthing() to segfault.
Actors can use this issue to potentially cause a denial of service condition. (
( CVE-2022-34266)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2-2022-1814 -
alas.aws.amazon.com/AL2/ALAS-2022-1814.html
CVEs related to QID 353984
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2-2022-1814 | Amazon Linux 2 |
|