Vulnerability Details : CVE-2022-2520
Potential exploit
A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.
Products affected by CVE-2022-2520
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:4.4.0:rc1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-2520
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 9 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-2520
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2022-2520
-
The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.Assigned by: secalert@redhat.com (Primary)
-
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.Assigned by: nvd@nist.gov (Secondary)
References for CVE-2022-2520
-
https://gitlab.com/libtiff/libtiff/-/merge_requests/378
tiffcrop: -S option mutually exclusive (fixes #349, #414, #422, #423, #424) (!378) · Merge requests · libtiff / libtiff · GitLabExploit;Issue Tracking;Patch;Third Party Advisory
-
https://gitlab.com/libtiff/libtiff/-/issues/424
tiffcrop: sysmalloc assertion in rotateImage() at tiffcrop.c:8621 (#424) · Issues · libtiff / libtiff · GitLabExploit;Issue Tracking;Patch;Third Party Advisory
-
https://www.debian.org/security/2023/dsa-5333
Debian -- Security Information -- DSA-5333-1 tiffThird Party Advisory
Jump to