CVE-2022-0908 — NULL Pointer Dereference in Tiff
Severity
5.5MEDIUMNVD
OSV7.5
EPSS
0.0%
top 89.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 11
Latest updateSep 12
Description
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages5 packages
Also affects: Debian Linux 10.0, 11.0, Fedora 35, 36
Patches
🔴Vulnerability Details
4📋Vendor Advisories
5Red Hat▶
tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c↗2022-03-11
Microsoft▶
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.↗2022-03-08
Debian▶
CVE-2022-0908: tiff - Null source pointer passed as an argument to memcpy() function within TIFFFetchN...↗2022