CVE-2022-1622 - Out-of-bounds Read

Severity

55%

Complexity

18%

Confidentiality

60%

LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.

CVSS 3.1 Base Score 5.5. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P).

Demo Examples

Out-of-bounds Read

CWE-125

In the following code, the method retrieves a value from an array at a specific array index location that is given as an input parameter to the method


               
}
return value;// check that the array index is less than the maximum// length of the array
value = array[index];// get the value at the specified index of the array
// if array index is invalid then output error message// and return value indicating error
value = -1;

However, this method only verifies that the given array index is less than the maximum length of the array but does not check for the minimum value (CWE-839). This will allow a negative value to be accepted as the input array index, which will result in a out of bounds read (CWE-125) and may allow access to sensitive memory. The input array index should be checked to verify that is within the maximum and minimum range required for the array (CWE-129). In this example the if statement should be modified to include a minimum range check, as shown below.


               
...// check that the array index is within the correct// range of values for the array

Overview

First reported 2 years ago

2022-05-11 15:15:00

Last updated 2 years ago

2022-11-07 20:52:00

Affected Software

NetApp ONTAP Select Deploy Administration Utility

References

https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a

https://gitlab.com/libtiff/libtiff/-/issues/410

https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json

https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a

Patch, Third Party Advisory

https://gitlab.com/libtiff/libtiff/-/issues/410

Exploit, Third Party Advisory

https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1622.json

Third Party Advisory

https://security.netapp.com/advisory/ntap-20220616-0005/

FEDORA-2022-ea3ebeff3d

FEDORA-2022-e9fe21d102

https://security.netapp.com/advisory/ntap-20220616-0005/

Third Party Advisory

FEDORA-2022-ea3ebeff3d

Mailing List, Third Party Advisory

FEDORA-2022-e9fe21d102

Mailing List, Third Party Advisory

https://support.apple.com/kb/HT213488

https://support.apple.com/kb/HT213446

https://support.apple.com/kb/HT213444

https://support.apple.com/kb/HT213443

https://support.apple.com/kb/HT213486

https://support.apple.com/kb/HT213487

20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13

https://support.apple.com/kb/HT213488

Release Notes, Third Party Advisory

https://support.apple.com/kb/HT213446

Release Notes, Third Party Advisory

https://support.apple.com/kb/HT213444

Release Notes, Third Party Advisory

https://support.apple.com/kb/HT213443

Release Notes, Third Party Advisory

https://support.apple.com/kb/HT213486

Release Notes, Third Party Advisory

https://support.apple.com/kb/HT213487

Release Notes, Third Party Advisory

20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13

Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.