CVE-2022-0561

Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712.
References
Link Resource
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef Patch Third Party Advisory
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/362 Exploit Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.gentoo.org/glsa/202210-10 Third Party Advisory
https://security.netapp.com/advisory/ntap-20220318-0001/ Third Party Advisory
https://www.debian.org/security/2022/dsa-5108 Third Party Advisory
https://gitlab.com/freedesktop-sdk/mirrors/gitlab/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef Patch Third Party Advisory
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0561.json Third Party Advisory
https://gitlab.com/libtiff/libtiff/-/issues/362 Exploit Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/03/msg00001.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZEHZ35XVO2VBZ4HHCMM6J6TQIDSBQOM/
https://security.gentoo.org/glsa/202210-10 Third Party Advisory
https://security.netapp.com/advisory/ntap-20220318-0001/ Third Party Advisory
https://www.debian.org/security/2022/dsa-5108 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-02-11 18:15

Updated : 2024-11-21 06:38


NVD link : CVE-2022-0561

Mitre link : CVE-2022-0561

CVE.ORG link : CVE-2022-0561


JSON object : View

Products Affected

libtiff

  • libtiff

debian

  • debian_linux

fedoraproject

  • fedora

redhat

  • enterprise_linux

netapp

  • ontap_select_deploy_administration_utility
CWE
CWE-476

NULL Pointer Dereference