CVE-2022-35099: n/a in n/a
SWFTools commit 772e55a2 was discovered to contain a stack overflow via ImageStream::getPixel(unsigned char*) at /xpdf/Stream.cc.
AI Analysis
Technical Summary
CVE-2022-35099 is a medium severity stack overflow vulnerability identified in the SWFTools project, specifically within the ImageStream::getPixel(unsigned char*) function located in the /xpdf/Stream.cc source file. The vulnerability arises due to improper handling of pixel data in the ImageStream class, which leads to a stack-based buffer overflow condition. This type of vulnerability (CWE-787) can cause the application to crash or potentially allow an attacker to execute arbitrary code in the context of the vulnerable process. The CVSS 3.1 base score is 5.5, reflecting a medium severity level. The vector indicates that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but does require user interaction (UI:R). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) with no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or fixed versions have been explicitly linked in the provided data. The vulnerability was published on September 23, 2022, and is tracked by MITRE and CISA. Given the nature of the vulnerability, exploitation would typically require a local attacker to trick a user into opening a crafted file or interacting with malicious content that triggers the vulnerable function, leading to denial of service or potential code execution if further exploitation is possible.
Potential Impact
For European organizations, the primary impact of CVE-2022-35099 is the potential for denial of service (DoS) conditions in systems utilizing the vulnerable SWFTools components, particularly those that process image streams or PDF-related content via the affected ImageStream::getPixel function. While the vulnerability does not directly compromise confidentiality or integrity, service disruption could affect business operations, especially in environments where SWFTools is integrated into automated workflows for document processing, publishing, or archival systems. Organizations in sectors such as media, publishing, legal, and government that rely on SWFTools or similar open-source utilities for document manipulation may face operational interruptions. The requirement for local access and user interaction limits remote exploitation, reducing the risk of widespread attacks but increasing the threat in insider or targeted attack scenarios. Additionally, the absence of known exploits in the wild suggests limited active threat but does not preclude future exploitation attempts. European entities should be aware that unpatched systems could be vulnerable to crafted files causing crashes or service outages, potentially impacting availability of critical document processing services.
Mitigation Recommendations
To mitigate CVE-2022-35099, European organizations should first identify all instances where SWFTools or related components that include the vulnerable ImageStream::getPixel function are deployed. Since no explicit patches are linked, organizations should monitor official SWFTools repositories and security advisories for updates or patches addressing this issue. In the interim, restrict local access to systems running SWFTools to trusted users only, and implement strict file handling policies to prevent opening untrusted or unsolicited files that might trigger the vulnerability. Employ application whitelisting and sandboxing techniques to limit the impact of potential exploitation. Additionally, enhance user awareness training to reduce the risk of social engineering that could lead to user interaction with malicious files. Regularly audit and monitor logs for abnormal application crashes or behavior indicative of exploitation attempts. Where feasible, consider replacing or isolating SWFTools with alternative, actively maintained tools that provide similar functionality but without this vulnerability. Finally, maintain up-to-date endpoint protection and intrusion detection systems capable of detecting anomalous activity related to exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2022-35099: n/a in n/a
Description
SWFTools commit 772e55a2 was discovered to contain a stack overflow via ImageStream::getPixel(unsigned char*) at /xpdf/Stream.cc.
AI-Powered Analysis
Technical Analysis
CVE-2022-35099 is a medium severity stack overflow vulnerability identified in the SWFTools project, specifically within the ImageStream::getPixel(unsigned char*) function located in the /xpdf/Stream.cc source file. The vulnerability arises due to improper handling of pixel data in the ImageStream class, which leads to a stack-based buffer overflow condition. This type of vulnerability (CWE-787) can cause the application to crash or potentially allow an attacker to execute arbitrary code in the context of the vulnerable process. The CVSS 3.1 base score is 5.5, reflecting a medium severity level. The vector indicates that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but does require user interaction (UI:R). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) with no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches or fixed versions have been explicitly linked in the provided data. The vulnerability was published on September 23, 2022, and is tracked by MITRE and CISA. Given the nature of the vulnerability, exploitation would typically require a local attacker to trick a user into opening a crafted file or interacting with malicious content that triggers the vulnerable function, leading to denial of service or potential code execution if further exploitation is possible.
Potential Impact
For European organizations, the primary impact of CVE-2022-35099 is the potential for denial of service (DoS) conditions in systems utilizing the vulnerable SWFTools components, particularly those that process image streams or PDF-related content via the affected ImageStream::getPixel function. While the vulnerability does not directly compromise confidentiality or integrity, service disruption could affect business operations, especially in environments where SWFTools is integrated into automated workflows for document processing, publishing, or archival systems. Organizations in sectors such as media, publishing, legal, and government that rely on SWFTools or similar open-source utilities for document manipulation may face operational interruptions. The requirement for local access and user interaction limits remote exploitation, reducing the risk of widespread attacks but increasing the threat in insider or targeted attack scenarios. Additionally, the absence of known exploits in the wild suggests limited active threat but does not preclude future exploitation attempts. European entities should be aware that unpatched systems could be vulnerable to crafted files causing crashes or service outages, potentially impacting availability of critical document processing services.
Mitigation Recommendations
To mitigate CVE-2022-35099, European organizations should first identify all instances where SWFTools or related components that include the vulnerable ImageStream::getPixel function are deployed. Since no explicit patches are linked, organizations should monitor official SWFTools repositories and security advisories for updates or patches addressing this issue. In the interim, restrict local access to systems running SWFTools to trusted users only, and implement strict file handling policies to prevent opening untrusted or unsolicited files that might trigger the vulnerability. Employ application whitelisting and sandboxing techniques to limit the impact of potential exploitation. Additionally, enhance user awareness training to reduce the risk of social engineering that could lead to user interaction with malicious files. Regularly audit and monitor logs for abnormal application crashes or behavior indicative of exploitation attempts. Where feasible, consider replacing or isolating SWFTools with alternative, actively maintained tools that provide similar functionality but without this vulnerability. Finally, maintain up-to-date endpoint protection and intrusion detection systems capable of detecting anomalous activity related to exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-07-04T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f866a0acd01a249266e69
Added to database: 5/22/2025, 8:17:46 PM
Last enriched: 7/8/2025, 6:10:39 AM
Last updated: 2/7/2026, 1:19:17 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Organizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.