Skip to main content

CVE-2022-35099: n/a in n/a

Medium
VulnerabilityCVE-2022-35099cvecve-2022-35099
Published: Fri Sep 23 2022 (09/23/2022, 17:11:58 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

SWFTools commit 772e55a2 was discovered to contain a stack overflow via ImageStream::getPixel(unsigned char*) at /xpdf/Stream.cc.

AI-Powered Analysis

AILast updated: 07/08/2025, 06:10:39 UTC

Technical Analysis

CVE-2022-35099 is a medium severity stack overflow vulnerability identified in the SWFTools project, specifically within the ImageStream::getPixel(unsigned char*) function located in the /xpdf/Stream.cc source file. The vulnerability arises due to improper handling of pixel data in the ImageStream class, which leads to a stack-based buffer overflow condition. This type of vulnerability (CWE-787) can cause the application to crash or potentially allow an attacker to execute arbitrary code in the context of the vulnerable process. The CVSS 3.1 base score is 5.5, reflecting a medium severity level. The vector indicates that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but does require user interaction (UI:R). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) with no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or fixed versions have been explicitly linked in the provided data. The vulnerability was published on September 23, 2022, and is tracked by MITRE and CISA. Given the nature of the vulnerability, exploitation would typically require a local attacker to trick a user into opening a crafted file or interacting with malicious content that triggers the vulnerable function, leading to denial of service or potential code execution if further exploitation is possible.

Potential Impact

For European organizations, the primary impact of CVE-2022-35099 is the potential for denial of service (DoS) conditions in systems utilizing the vulnerable SWFTools components, particularly those that process image streams or PDF-related content via the affected ImageStream::getPixel function. While the vulnerability does not directly compromise confidentiality or integrity, service disruption could affect business operations, especially in environments where SWFTools is integrated into automated workflows for document processing, publishing, or archival systems. Organizations in sectors such as media, publishing, legal, and government that rely on SWFTools or similar open-source utilities for document manipulation may face operational interruptions. The requirement for local access and user interaction limits remote exploitation, reducing the risk of widespread attacks but increasing the threat in insider or targeted attack scenarios. Additionally, the absence of known exploits in the wild suggests limited active threat but does not preclude future exploitation attempts. European entities should be aware that unpatched systems could be vulnerable to crafted files causing crashes or service outages, potentially impacting availability of critical document processing services.

Mitigation Recommendations

To mitigate CVE-2022-35099, European organizations should first identify all instances where SWFTools or related components that include the vulnerable ImageStream::getPixel function are deployed. Since no explicit patches are linked, organizations should monitor official SWFTools repositories and security advisories for updates or patches addressing this issue. In the interim, restrict local access to systems running SWFTools to trusted users only, and implement strict file handling policies to prevent opening untrusted or unsolicited files that might trigger the vulnerability. Employ application whitelisting and sandboxing techniques to limit the impact of potential exploitation. Additionally, enhance user awareness training to reduce the risk of social engineering that could lead to user interaction with malicious files. Regularly audit and monitor logs for abnormal application crashes or behavior indicative of exploitation attempts. Where feasible, consider replacing or isolating SWFTools with alternative, actively maintained tools that provide similar functionality but without this vulnerability. Finally, maintain up-to-date endpoint protection and intrusion detection systems capable of detecting anomalous activity related to exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-07-04T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f866a0acd01a249266e69

Added to database: 5/22/2025, 8:17:46 PM

Last enriched: 7/8/2025, 6:10:39 AM

Last updated: 8/1/2025, 10:35:55 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats