Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-0908

Опубликовано: 11 мар. 2022
Источник: debian
EPSS Низкий

Описание

Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tifffixed4.3.0-6package

Примечания

  • https://gitlab.com/libtiff/libtiff/-/commit/a95b799f65064e4ba2e2dfc206808f86faf93e85

  • https://gitlab.com/libtiff/libtiff/-/issues/383

EPSS

Процентиль: 14%
0.00047
Низкий

Связанные уязвимости

CVSS3: 7.7
ubuntu
больше 3 лет назад

Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.

CVSS3: 5.5
redhat
больше 3 лет назад

Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.

CVSS3: 7.7
nvd
больше 3 лет назад

Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.

CVSS3: 5.5
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 5.5
github
больше 3 лет назад

Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.

EPSS

Процентиль: 14%
0.00047
Низкий