vulnerability
Red Hat: CVE-2022-1355: stack-buffer-overflow in tiffcp.c in main() (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:M/Au:N/C:P/I:P/A:C) | Aug 31, 2022 | Nov 9, 2022 | Sep 1, 2025 |
Severity
6
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:C)
Published
Aug 31, 2022
Added
Nov 9, 2022
Modified
Sep 1, 2025
Description
A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
Solutions
redhat-upgrade-libtiffredhat-upgrade-libtiff-debuginforedhat-upgrade-libtiff-debugsourceredhat-upgrade-libtiff-develredhat-upgrade-libtiff-toolsredhat-upgrade-libtiff-tools-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.