CVE-2022-0562

Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
GitLabCNA
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 6%
VendorProductVersion
libtifflibtiff
4.0.0 ≤
𝑥
≤ 4.3.0
debiandebian_linux
9.0
debiandebian_linux
10.0
debiandebian_linux
11.0
netappontap_select_deploy_administration_utility
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tiff
bullseye (security)
4.2.0-1+deb11u5
fixed
bullseye
4.2.0-1+deb11u5
fixed
bookworm
4.5.0-6+deb12u1
fixed
bookworm (security)
4.5.0-6+deb12u1
fixed
sid
4.5.1+git230720-5
fixed
trixie
4.5.1+git230720-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tiff
jammy
not-affected
impish
Fixed 4.3.0-1ubuntu0.1
released
focal
Fixed 4.1.0+git191117-2ubuntu0.20.04.3
released
bionic
Fixed 4.0.9-5ubuntu0.5
released
xenial
Fixed 4.0.6-1ubuntu0.8+esm1
released
trusty
Fixed 4.0.3-7ubuntu0.11+esm1
released