CVE-2022-1623

LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
References
Link Resource
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a Patch Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/410 Exploit Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/
https://security.gentoo.org/glsa/202210-10 Third Party Advisory
https://security.netapp.com/advisory/ntap-20220616-0005/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5333 Third Party Advisory
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a Patch Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/410 Exploit Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/
https://security.gentoo.org/glsa/202210-10 Third Party Advisory
https://security.netapp.com/advisory/ntap-20220616-0005/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5333 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libtiff:libtiff:4.3.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:41

Type Values Removed Values Added
References () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json - Third Party Advisory () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json - Third Party Advisory
References () https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a - Patch, Third Party Advisory () https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a - Patch, Third Party Advisory
References () https://gitlab.com/libtiff/libtiff/-/issues/410 - Exploit, Third Party Advisory () https://gitlab.com/libtiff/libtiff/-/issues/410 - Exploit, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/ -
References () https://security.gentoo.org/glsa/202210-10 - Third Party Advisory () https://security.gentoo.org/glsa/202210-10 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20220616-0005/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20220616-0005/ - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5333 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5333 - Third Party Advisory

07 Nov 2023, 03:42

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/', 'name': 'FEDORA-2022-e9fe21d102', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/', 'name': 'FEDORA-2022-ea3ebeff3d', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/ -

Information

Published : 2022-05-11 15:15

Updated : 2024-11-21 06:41


NVD link : CVE-2022-1623

Mitre link : CVE-2022-1623

CVE.ORG link : CVE-2022-1623


JSON object : View

Products Affected

netapp

  • ontap_select_deploy_administration_utility

debian

  • debian_linux

libtiff

  • libtiff

fedoraproject

  • fedora
CWE
CWE-125

Out-of-bounds Read