QID 354038

Date Published: 2022-08-08

QID 354038: Amazon Linux Security Advisory for libtiff : ALAS-2022-1625

integer overflow in the writebuffertoseparatestrips function in tiffcrop.c in libtiff before 4.0.7 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tif file. (
( CVE-2016-9532) a flaw was found in libtiff.
Due to a memory allocation failure in tif_read.c, a crafted tiff file can lead to an abort, resulting in denial of service. (
( CVE-2020-35521) in libtiff, there is a memory malloc failure in tif_pixarlog.c.
A crafted tiff document can lead to an abort, resulting in a remote denial of service attack. (
( CVE-2020-35522) an integer overflow flaw was found in libtiff that exists in the tif_getimage.c file.
This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted tiff file.
The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (
( CVE-2020-35523) a heap-based buffer overflow flaw was found in libtiff in the handling of tiff images in libtiffs tiff2pdf tool.
A specially crafted tiff file can lead to arbitrary code execution.
( CVE-2020-35524) a flaw was found in libtiff where a null source pointer passed as an argument to the memcpy() function within the tifffetchstripthing() in tif_dirread.c.
This flaw allows an attacker with a crafted tiff file to exploit this flaw, causing a crash and leading to a denial of service. (
( CVE-2022-0561) a flaw was found in libtiff where a null source pointer passed as an argument to the memcpy() function within the tiffreaddirectory() in tif_dirread.c.
This flaw allows an attacker to exploit this vulnerability via a crafted tiff file, causing a crash and leading to a denial of service. (
( CVE-2022-22844)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2022-1625 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS-2022-1625 Amazon Linux URL Logo alas.aws.amazon.com/ALAS-2022-1625.html