cve/2022/CVE-2022-1355.md

18 lines
822 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-1355](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1355)
![](https://img.shields.io/static/v1?label=Product&message=libtiff&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Not-Known%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121%20-%20Stack-based%20Buffer%20Overflow.&color=brighgreen)
### Description
A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
### POC
#### Reference
- https://gitlab.com/libtiff/libtiff/-/issues/400
#### Github
- https://github.com/ARPSyndicate/cvemon