QID 354293

Date Published: 2022-12-21

QID 354293: Amazon Linux Security Advisory for libtiff : ALAS2022-2022-049

a flaw was found in libtiff where a null source pointer passed as an argument to the memcpy() function within the tifffetchstripthing() in tif_dirread.c.
This flaw allows an attacker with a crafted tiff file to exploit this flaw, causing a crash and leading to a denial of service. (
( CVE-2022-0561) a flaw was found in libtiff where a null source pointer passed as an argument to the memcpy() function within the tiffreaddirectory() in tif_dirread.c.
This flaw allows an attacker to exploit this vulnerability via a crafted tiff file, causing a crash and leading to a denial of service. (
( CVE-2022-0562) a reachable assertion failure was found in libtiffs jbig functionality.
This flaw allows an attacker who can submit a crafted file to an application linked with libtiff and using the jbig functionality, causes a crash via an assertion failure, leading to a denial of service.
The exact mechanism and conditions around this issue are dependent on how the application uses libtiff. (
( CVE-2022-0865) a heap buffer overflow in extractimagesection function in tiffcrop.c in libtiff library version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted tiff image file which could result into application crash, potential information disclosure or any other context-dependent impact (cve-2022-0891) a null pointer dereference flaw was found in libtiff.
This flaw allows an attacker with a crafted tiff file to cause a crash that leads to a denial of service. (
( CVE-2022-0907) a flaw was found in libtiff where a null source pointer passed as an argument to the memcpy() function within the tifffetchnormaltag() in tif_dirread.c.
( CVE-2022-22844)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.1 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2022-2022-049 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2022-2022-049 amazon linux 2022 URL Logo alas.aws.amazon.com/AL2022/ALAS-2022-049.html