CVE Vulnerabilities

CVE-2022-0561

NULL Pointer Dereference

Published: Feb 11, 2022 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
LOW

Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Libtiff Libtiff 3.9.0 (including) 4.3.0 (including)
Red Hat Enterprise Linux 8 RedHat libtiff-0:4.0.9-23.el8 *
Red Hat Enterprise Linux 9 RedHat libtiff-0:4.4.0-2.el9 *
Tiff Ubuntu bionic *
Tiff Ubuntu esm-infra/xenial *
Tiff Ubuntu focal *
Tiff Ubuntu impish *
Tiff Ubuntu trusty *
Tiff Ubuntu trusty/esm *
Tiff Ubuntu upstream *
Tiff Ubuntu xenial *

Potential Mitigations

References