CVE-2022-35095: n/a in n/a
SWFTools commit 772e55a2 was discovered to contain a segmentation violation via InfoOutputDev::type3D1 at /pdf/InfoOutputDev.cc.
AI Analysis
Technical Summary
CVE-2022-35095 is a medium-severity vulnerability identified in SWFTools, specifically related to a segmentation violation occurring in the function InfoOutputDev::type3D1 within the source file /pdf/InfoOutputDev.cc. This vulnerability is classified under CWE-787, which corresponds to out-of-bounds write errors, indicating that the software attempts to write data outside the boundaries of allocated memory. Such memory corruption issues can lead to application crashes or potentially be leveraged to execute arbitrary code, although in this case, the CVSS vector indicates no impact on confidentiality or integrity, only availability. The CVSS 3.1 base score is 5.5, reflecting a medium severity level. The attack vector is local (AV:L), meaning an attacker must have local access to the system to exploit the vulnerability. The attack complexity is low (AC:L), no privileges are required (PR:N), but user interaction is required (UI:R), and the scope remains unchanged (S:U). The impact is limited to availability (A:H), indicating that exploitation can cause denial of service by crashing the application. No known exploits are reported in the wild, and no patches or vendor information are currently available. The vulnerability was published on September 23, 2022, and is associated with a specific commit (772e55a2) in the SWFTools project. SWFTools is a collection of utilities for working with Adobe Flash files and PDF documents, often used in document processing workflows.
Potential Impact
For European organizations, the primary impact of CVE-2022-35095 is the potential disruption of services relying on SWFTools for PDF or Flash file processing. Since the vulnerability can cause application crashes via a segmentation fault, it may lead to denial of service conditions, affecting availability of document processing pipelines. This could impact sectors such as publishing, digital media, legal, and governmental agencies that utilize SWFTools in their workflows. However, the local attack vector and requirement for user interaction limit the risk of remote exploitation. The absence of confidentiality or integrity impact reduces the risk of data breaches or unauthorized data manipulation. Nonetheless, denial of service in critical document processing systems could delay operations and cause productivity losses. Organizations using SWFTools on local machines or servers should be aware of this vulnerability, especially if untrusted or maliciously crafted PDF files are processed by users, as this could trigger the crash.
Mitigation Recommendations
Given the lack of an official patch or vendor guidance, European organizations should implement the following specific mitigations: 1) Restrict local access to systems running SWFTools to trusted users only, minimizing the risk of local exploitation. 2) Implement strict file validation and scanning to detect and block malformed or suspicious PDF files before processing with SWFTools. 3) Employ application sandboxing or containerization to isolate SWFTools processes, limiting the impact of potential crashes on the broader system. 4) Monitor logs and system behavior for signs of crashes or abnormal terminations related to SWFTools usage. 5) Consider replacing SWFTools with alternative, actively maintained PDF processing tools that do not exhibit this vulnerability. 6) Educate users about the risk of opening untrusted PDF or Flash files locally, emphasizing cautious handling to prevent triggering the vulnerability. 7) Stay updated with SWFTools project communications for any forthcoming patches or security advisories.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2022-35095: n/a in n/a
Description
SWFTools commit 772e55a2 was discovered to contain a segmentation violation via InfoOutputDev::type3D1 at /pdf/InfoOutputDev.cc.
AI-Powered Analysis
Technical Analysis
CVE-2022-35095 is a medium-severity vulnerability identified in SWFTools, specifically related to a segmentation violation occurring in the function InfoOutputDev::type3D1 within the source file /pdf/InfoOutputDev.cc. This vulnerability is classified under CWE-787, which corresponds to out-of-bounds write errors, indicating that the software attempts to write data outside the boundaries of allocated memory. Such memory corruption issues can lead to application crashes or potentially be leveraged to execute arbitrary code, although in this case, the CVSS vector indicates no impact on confidentiality or integrity, only availability. The CVSS 3.1 base score is 5.5, reflecting a medium severity level. The attack vector is local (AV:L), meaning an attacker must have local access to the system to exploit the vulnerability. The attack complexity is low (AC:L), no privileges are required (PR:N), but user interaction is required (UI:R), and the scope remains unchanged (S:U). The impact is limited to availability (A:H), indicating that exploitation can cause denial of service by crashing the application. No known exploits are reported in the wild, and no patches or vendor information are currently available. The vulnerability was published on September 23, 2022, and is associated with a specific commit (772e55a2) in the SWFTools project. SWFTools is a collection of utilities for working with Adobe Flash files and PDF documents, often used in document processing workflows.
Potential Impact
For European organizations, the primary impact of CVE-2022-35095 is the potential disruption of services relying on SWFTools for PDF or Flash file processing. Since the vulnerability can cause application crashes via a segmentation fault, it may lead to denial of service conditions, affecting availability of document processing pipelines. This could impact sectors such as publishing, digital media, legal, and governmental agencies that utilize SWFTools in their workflows. However, the local attack vector and requirement for user interaction limit the risk of remote exploitation. The absence of confidentiality or integrity impact reduces the risk of data breaches or unauthorized data manipulation. Nonetheless, denial of service in critical document processing systems could delay operations and cause productivity losses. Organizations using SWFTools on local machines or servers should be aware of this vulnerability, especially if untrusted or maliciously crafted PDF files are processed by users, as this could trigger the crash.
Mitigation Recommendations
Given the lack of an official patch or vendor guidance, European organizations should implement the following specific mitigations: 1) Restrict local access to systems running SWFTools to trusted users only, minimizing the risk of local exploitation. 2) Implement strict file validation and scanning to detect and block malformed or suspicious PDF files before processing with SWFTools. 3) Employ application sandboxing or containerization to isolate SWFTools processes, limiting the impact of potential crashes on the broader system. 4) Monitor logs and system behavior for signs of crashes or abnormal terminations related to SWFTools usage. 5) Consider replacing SWFTools with alternative, actively maintained PDF processing tools that do not exhibit this vulnerability. 6) Educate users about the risk of opening untrusted PDF or Flash files locally, emphasizing cautious handling to prevent triggering the vulnerability. 7) Stay updated with SWFTools project communications for any forthcoming patches or security advisories.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-07-04T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68308f330acd01a249273ca6
Added to database: 5/23/2025, 3:07:31 PM
Last enriched: 7/8/2025, 10:58:25 PM
Last updated: 2/7/2026, 8:24:34 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighCVE-2026-2074: XML External Entity Reference in O2OA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.