CVE-2022-3970

A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be. It is recommended to apply a patch to fix this issue. The identifier VDB-213549 was assigned to this vulnerability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
VulDBCNA
6.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 22%
VendorProductVersion
libtifflibtiff
𝑥
< 4.5.0
netappactive_iq_unified_manager
-
debiandebian_linux
10.0
applesafari
𝑥
< 16.5.1
appleipados
𝑥
< 16.6
appleiphone_os
𝑥
< 16.6
applemacos
𝑥
< 13.5
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tiff
bullseye (security)
4.2.0-1+deb11u5
fixed
bullseye
4.2.0-1+deb11u5
fixed
bookworm
4.5.0-6+deb12u1
fixed
bookworm (security)
4.5.0-6+deb12u1
fixed
sid
4.5.1+git230720-5
fixed
trixie
4.5.1+git230720-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libtiff
kinetic
dne
jammy
dne
focal
dne
bionic
dne
xenial
ignored
trusty
ignored
tiff
kinetic
Fixed 4.4.0-4ubuntu3.2
released
jammy
Fixed 4.3.0-6ubuntu0.3
released
focal
Fixed 4.1.0+git191117-2ubuntu0.20.04.7
released
bionic
Fixed 4.0.9-5ubuntu0.9
released
xenial
Fixed 4.0.6-1ubuntu0.8+esm8
released
trusty
Fixed 4.0.3-7ubuntu0.11+esm6
released
Common Weakness Enumeration