Vulnerability Name: | CVE-2022-1355 (CCN-229316) | ||||||||||||||||||
Assigned: | 2022-04-11 | ||||||||||||||||||
Published: | 2022-04-11 | ||||||||||||||||||
Updated: | 2023-02-23 | ||||||||||||||||||
Summary: | A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service. | ||||||||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H) 5.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H/E:U/RL:O/RC:C)
5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C)
5.8 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||
CVSS v2 Severity: | 5.7 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:P/I:P/A:C)
| ||||||||||||||||||
Vulnerability Type: | CWE-121 | ||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-1355 Source: secalert@redhat.com Type: Issue Tracking, Third Party Advisory secalert@redhat.com Source: CCN Type: Red Hat Bugzilla Bug 2074415 (CVE-2022-1355) - CVE-2022-1355 libtiff: stack-buffer-overflow in tiffcp.c in main() Source: secalert@redhat.com Type: Exploit, Issue Tracking, Third Party Advisory secalert@redhat.com Source: XF Type: UNKNOWN libtiff-cve20221355-bo(229316) Source: CCN Type: libtiff GIT Repository AddressSanitizer: stack-buffer-overflow /home/lin/Downloads/libtiff/tools/tiffcp.c:289 in main Source: secalert@redhat.com Type: Exploit, Issue Tracking, Patch, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Issue Tracking, Patch, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: SNYK-UNMANAGED-LIBTIFF-2764993 Buffer Overflow Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: IBM Security Bulletin 6843929 (App Connect Enterprise Certified Container) IBM App Connect Enterprise Certified Container DesignerAuthoring operands that use mapping assistance may be vulnerable to arbitrary code execution due to CVE-2022-1355 Source: CCN Type: IBM Security Bulletin 6921283 (Robotic Process Automation for Cloud Pak) Multiple Security Vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak. Source: CCN Type: IBM Security Bulletin 6955937 (Watson Discovery) IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in LibTIFF Source: CCN Type: Mend Vulnerability Database CVE-2022-1355 | ||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |