Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-35095: n/a in n/a

0
Medium
VulnerabilityCVE-2022-35095cvecve-2022-35095
Published: Fri Sep 23 2022 (09/23/2022, 17:11:31 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

SWFTools commit 772e55a2 was discovered to contain a segmentation violation via InfoOutputDev::type3D1 at /pdf/InfoOutputDev.cc.

AI-Powered Analysis

AILast updated: 07/08/2025, 22:58:25 UTC

Technical Analysis

CVE-2022-35095 is a medium-severity vulnerability identified in SWFTools, specifically related to a segmentation violation occurring in the function InfoOutputDev::type3D1 within the source file /pdf/InfoOutputDev.cc. This vulnerability is classified under CWE-787, which corresponds to out-of-bounds write errors, indicating that the software attempts to write data outside the boundaries of allocated memory. Such memory corruption issues can lead to application crashes or potentially be leveraged to execute arbitrary code, although in this case, the CVSS vector indicates no impact on confidentiality or integrity, only availability. The CVSS 3.1 base score is 5.5, reflecting a medium severity level. The attack vector is local (AV:L), meaning an attacker must have local access to the system to exploit the vulnerability. The attack complexity is low (AC:L), no privileges are required (PR:N), but user interaction is required (UI:R), and the scope remains unchanged (S:U). The impact is limited to availability (A:H), indicating that exploitation can cause denial of service by crashing the application. No known exploits are reported in the wild, and no patches or vendor information are currently available. The vulnerability was published on September 23, 2022, and is associated with a specific commit (772e55a2) in the SWFTools project. SWFTools is a collection of utilities for working with Adobe Flash files and PDF documents, often used in document processing workflows.

Potential Impact

For European organizations, the primary impact of CVE-2022-35095 is the potential disruption of services relying on SWFTools for PDF or Flash file processing. Since the vulnerability can cause application crashes via a segmentation fault, it may lead to denial of service conditions, affecting availability of document processing pipelines. This could impact sectors such as publishing, digital media, legal, and governmental agencies that utilize SWFTools in their workflows. However, the local attack vector and requirement for user interaction limit the risk of remote exploitation. The absence of confidentiality or integrity impact reduces the risk of data breaches or unauthorized data manipulation. Nonetheless, denial of service in critical document processing systems could delay operations and cause productivity losses. Organizations using SWFTools on local machines or servers should be aware of this vulnerability, especially if untrusted or maliciously crafted PDF files are processed by users, as this could trigger the crash.

Mitigation Recommendations

Given the lack of an official patch or vendor guidance, European organizations should implement the following specific mitigations: 1) Restrict local access to systems running SWFTools to trusted users only, minimizing the risk of local exploitation. 2) Implement strict file validation and scanning to detect and block malformed or suspicious PDF files before processing with SWFTools. 3) Employ application sandboxing or containerization to isolate SWFTools processes, limiting the impact of potential crashes on the broader system. 4) Monitor logs and system behavior for signs of crashes or abnormal terminations related to SWFTools usage. 5) Consider replacing SWFTools with alternative, actively maintained PDF processing tools that do not exhibit this vulnerability. 6) Educate users about the risk of opening untrusted PDF or Flash files locally, emphasizing cautious handling to prevent triggering the vulnerability. 7) Stay updated with SWFTools project communications for any forthcoming patches or security advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-07-04T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68308f330acd01a249273ca6

Added to database: 5/23/2025, 3:07:31 PM

Last enriched: 7/8/2025, 10:58:25 PM

Last updated: 2/7/2026, 8:24:34 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats