CVE-2022-0908NULL Pointer Dereference in Tiff

Severity
5.5MEDIUMNVD
OSV7.5
EPSS
0.0%
top 89.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 11
Latest updateSep 12

Description

Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

Also affects: Debian Linux 10.0, 11.0, Fedora 35, 36

Patches

🔴Vulnerability Details

4
OSV
tiff vulnerabilities2022-09-12
OSV
tiff vulnerabilities2022-07-19
GHSA
GHSA-gqxh-jf4f-xfjr: Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread2022-03-12
OSV
CVE-2022-0908: Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread2022-03-11

📋Vendor Advisories

5
Ubuntu
LibTIFF vulnerabilities2022-09-12
Ubuntu
LibTIFF vulnerabilities2022-07-19
Red Hat
tiff: Null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() in tif_dirread.c2022-03-11
Microsoft
Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.2022-03-08
Debian
CVE-2022-0908: tiff - Null source pointer passed as an argument to memcpy() function within TIFFFetchN...2022