cve/2022/CVE-2022-3597.md
2024-06-18 02:51:15 +02:00

22 lines
973 B
Markdown

### [CVE-2022-3597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3597)
![](https://img.shields.io/static/v1?label=Product&message=libtiff&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Out-of-bounds%20read%20in%20libtiff&color=brighgreen)
### Description
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6826, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
### POC
#### Reference
- https://gitlab.com/libtiff/libtiff/-/issues/413
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/maxim12z/ECommerce
- https://github.com/peng-hui/CarpetFuzz
- https://github.com/waugustus/CarpetFuzz
- https://github.com/waugustus/waugustus