### [CVE-2022-1622](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1622) ![](https://img.shields.io/static/v1?label=Product&message=libtiff&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Out-of-bounds%20read%20in%20libtiff&color=brighgreen) ### Description LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa. ### POC #### Reference - http://seclists.org/fulldisclosure/2022/Oct/41 - http://seclists.org/fulldisclosure/2022/Oct/41 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/peng-hui/CarpetFuzz - https://github.com/waugustus/CarpetFuzz - https://github.com/waugustus/waugustus