Advisory Database
  • Advisories
  • Dependency Scanning
  1. conan
  2. ›
  3. libtiff
  4. ›
  5. CVE-2022-3970

CVE-2022-3970: Integer Overflow or Wraparound

November 13, 2022 (updated November 17, 2023)

A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be. It is recommended to apply a patch to fix this issue. The identifier VDB-213549 was assigned to this vulnerability.

References

  • bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137
  • gitlab.com/libtiff/libtiff/-/commit/227500897dfb07fb7d27f7aa570050e62617e3be
  • nvd.nist.gov/vuln/detail/CVE-2022-3970
  • oss-fuzz.com/download?testcase_id=5738253143900160
  • vuldb.com/?id.213549

Code Behaviors & Features

Detect and mitigate CVE-2022-3970 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.5.0

Fixed versions

  • 4.5.0

Solution

Upgrade to version 4.5.0 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Source file

conan/libtiff/CVE-2022-3970.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:59 +0000.