### [CVE-2022-41977](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41977) ![](https://img.shields.io/static/v1?label=Product&message=OpenImageIO&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20master-branch-9aeece7a%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-125%3A%20Out-of-bounds%20Read&color=brighgreen) ### Description An out of bounds read vulnerability exists in the way OpenImageIO version v2.3.19.0 processes string fields in TIFF image files. A specially-crafted TIFF file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1627 #### Github No PoCs found on GitHub currently.