Vulnerability Name:

CVE-2022-0891 (CCN-221576)

Assigned:2022-02-22
Published:2022-02-22
Updated:2023-02-02
Summary:A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
CVSS v3 Severity:6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)
5.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): High
6.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)
5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): High
6.1 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H)
5.4 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): Partial
5.2 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:P/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-120
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2022-0891

Source: XF
Type: UNKNOWN
libtiff-cve20220891-bo(221576)

Source: cve@gitlab.com
Type: Patch, Third Party Advisory
cve@gitlab.com

Source: CCN
Type: GitLab Web site
CVE-2022-0891.json

Source: cve@gitlab.com
Type: Third Party Advisory, VDB Entry
cve@gitlab.com

Source: CCN
Type: libtiff GIT Repository
libtiff

Source: cve@gitlab.com
Type: Exploit, Issue Tracking, Patch, Third Party Advisory
cve@gitlab.com

Source: cve@gitlab.com
Type: Exploit, Issue Tracking, Patch, Third Party Advisory
cve@gitlab.com

Source: cve@gitlab.com
Type: Mailing List, Third Party Advisory
cve@gitlab.com

Source: cve@gitlab.com
Type: Mailing List, Third Party Advisory
cve@gitlab.com

Source: cve@gitlab.com
Type: Third Party Advisory
cve@gitlab.com

Source: cve@gitlab.com
Type: Third Party Advisory
cve@gitlab.com

Source: cve@gitlab.com
Type: Third Party Advisory
cve@gitlab.com

Source: CCN
Type: IBM Security Bulletin 6843935 (App Connect Enterprise Certified Container)
IBM App Connect Enterprise Certified Container DesignerAuthoring operands that use mapping assistance may be vulnerable to arbitrary code execution due to CVE-2022-0891

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/a:redhat:enterprise_linux:8::crb:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/a:redhat:enterprise_linux:9::crb:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:libtiff:libtiff:4.3.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:app_connect_enterprise_certified_container:4.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7682
    P
    libtiff-devel-4.0.9-150000.45.25.1 on GA media (Moderate)
    2023-06-12
    oval:com.redhat.rhsa:def:20228194
    P
    RHSA-2022:8194: libtiff security update (Moderate)
    2022-11-15
    oval:com.redhat.rhsa:def:20227585
    P
    RHSA-2022:7585: libtiff security update (Moderate)
    2022-11-08
    oval:org.opensuse.security:def:3737
    P
    pam_krb5-2.4.4-4.4 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3605
    P
    libical1-1.0.1-16.3.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:119592
    P
    Security update for tiff (Important)
    2022-05-30
    oval:org.opensuse.security:def:95367
    P
    Security update for tiff (Important)
    2022-05-30
    oval:org.opensuse.security:def:904
    P
    Security update for tiff (Important)
    2022-05-30
    oval:org.opensuse.security:def:118911
    P
    Security update for tiff (Important)
    2022-05-30
    oval:org.opensuse.security:def:500
    P
    Security update for tiff (Important)
    2022-05-30
    oval:org.opensuse.security:def:1073
    P
    Security update for tiff (Important)
    2022-05-30
    oval:org.opensuse.security:def:119217
    P
    Security update for tiff (Important)
    2022-05-30
    oval:org.opensuse.security:def:42393
    P
    Security update for tiff (Important)
    2022-05-30
    oval:org.opensuse.security:def:1517
    P
    Security update for tiff (Important)
    2022-05-30
    oval:org.opensuse.security:def:119407
    P
    Security update for tiff (Important)
    2022-05-30
    oval:org.opensuse.security:def:95235
    P
    Security update for tiff (Important)
    2022-05-30
    oval:org.opensuse.security:def:118721
    P
    Security update for tiff (Important)
    2022-05-30
    oval:org.opensuse.security:def:5238
    P
    Security update for tiff (Important)
    2022-05-16
    oval:org.opensuse.security:def:6036
    P
    Security update for tiff (Important)
    2022-05-16
    BACK
    libtiff libtiff 4.3.0
    ibm app connect enterprise certified container 4.2