QID 355159
Date Published: 2023-05-29
QID 355159: Amazon Linux Security Advisory for libtiff : ALAS2023-2023-050
a flaw was found in libtiff where a null source pointer passed as an argument to the memcpy() function within the tifffetchstripthing() in tif_dirread.c.
This flaw allows an attacker with a crafted tiff file to exploit this flaw, causing a crash and leading to a denial of service. (
( CVE-2022-0561) a flaw was found in libtiff where a null source pointer passed as an argument to the memcpy() function within the tiffreaddirectory() in tif_dirread.c.
This flaw allows an attacker to exploit this vulnerability via a crafted tiff file, causing a crash and leading to a denial of service. (
( CVE-2022-0562) a reachable assertion failure was found in libtiffs jbig functionality.
This flaw allows an attacker who can submit a crafted file to an application linked with libtiff and using the jbig functionality, causes a crash via an assertion failure, leading to a denial of service.
The exact mechanism and conditions around this issue are dependent on how the application uses libtiff. (
( CVE-2022-0865) a heap buffer overflow in extractimagesection function in tiffcrop.c in libtiff library version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted tiff image file which could result into application crash, potential information disclosure or any other context-dependent impact (cve-2022-0891) a null pointer dereference flaw was found in libtiff.
This flaw allows an attacker with a crafted tiff file to cause a crash that leads to a denial of service. (
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2023-2023-050 -
alas.aws.amazon.com/AL2023/ALAS-2023-050.html
CVEs related to QID 355159
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2023-2023-050 | amazon linux 2023 |
|