### [CVE-2022-3627](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3627) ![](https://img.shields.io/static/v1?label=Product&message=libtiff&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Out-of-bounds%20read%20in%20libtiff&color=brighgreen) ### Description LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/maxim12z/ECommerce - https://github.com/peng-hui/CarpetFuzz - https://github.com/waugustus/CarpetFuzz - https://github.com/waugustus/waugustus