CVE-2022-2058

Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
References
Link Resource
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/428 Exploit Issue Tracking Patch Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/merge_requests/346 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/
https://security.netapp.com/advisory/ntap-20220826-0001/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5333 Third Party Advisory
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/428 Exploit Issue Tracking Patch Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/merge_requests/346 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/
https://security.netapp.com/advisory/ntap-20220826-0001/ Third Party Advisory
https://www.debian.org/security/2023/dsa-5333 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libtiff:libtiff:4.4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:00

Type Values Removed Values Added
References () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json - Third Party Advisory () https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json - Third Party Advisory
References () https://gitlab.com/libtiff/libtiff/-/issues/428 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://gitlab.com/libtiff/libtiff/-/issues/428 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://gitlab.com/libtiff/libtiff/-/merge_requests/346 - Issue Tracking, Patch, Third Party Advisory () https://gitlab.com/libtiff/libtiff/-/merge_requests/346 - Issue Tracking, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/ -
References () https://security.netapp.com/advisory/ntap-20220826-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20220826-0001/ - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5333 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5333 - Third Party Advisory
CVSS v2 : 4.3
v3 : 6.5
v2 : 4.3
v3 : 5.5

07 Nov 2023, 03:46

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/', 'name': 'FEDORA-2022-edf7301147', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/', 'name': 'FEDORA-2022-b9c2a3a2b7', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TSS7MJ7OO7JO5BNKCRYSFU7UAYOKLA2/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/ -

Information

Published : 2022-06-30 16:15

Updated : 2024-11-21 07:00


NVD link : CVE-2022-2058

Mitre link : CVE-2022-2058

CVE.ORG link : CVE-2022-2058


JSON object : View

Products Affected

netapp

  • active_iq_unified_manager

debian

  • debian_linux

libtiff

  • libtiff

fedoraproject

  • fedora
CWE
CWE-369

Divide By Zero