CVE-2022-3626: Out-of-bounds write in libtiff in libtiff libtiff
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
AI Analysis
Technical Summary
CVE-2022-3626 is a medium-severity vulnerability identified in libtiff version 4.4.0 and earlier. The flaw is an out-of-bounds write occurring in the _TIFFmemset function within the libtiff/tif_unix.c source file, specifically at line 340. This function is invoked by processCropSelections in tools/tiffcrop.c at line 7619. The vulnerability arises when processing a specially crafted TIFF image file, which can trigger the out-of-bounds write condition. This memory corruption can lead to a denial-of-service (DoS) condition by crashing the application that uses libtiff to process the malicious TIFF file. The vulnerability does not impact confidentiality or integrity directly but affects availability by causing application crashes. Exploitation requires local access or the ability to supply a crafted TIFF file to an application that uses libtiff for image processing. User interaction is required to open or process the malicious TIFF file. The vulnerability has a CVSS v3.1 base score of 5.5, reflecting its medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No known exploits are reported in the wild, and the fix is available in the source code repository with commit 236b7191. Users compiling libtiff from source should apply this patch to remediate the issue. The vulnerability is categorized under CWE-787 (Out-of-bounds Write).
Potential Impact
For European organizations, the primary impact of CVE-2022-3626 is the potential disruption of services or applications that rely on libtiff for TIFF image processing. This could affect sectors such as media, publishing, scientific research, and any industry using image processing tools that incorporate libtiff. A successful exploit could cause application crashes leading to denial-of-service conditions, potentially interrupting workflows or automated image processing pipelines. Although the vulnerability does not allow data theft or modification, the availability impact could result in operational delays and increased support costs. Organizations that process large volumes of TIFF images or integrate libtiff into critical systems should be particularly vigilant. The requirement for user interaction and local or limited access reduces the risk of widespread remote exploitation but does not eliminate the threat in environments where users handle untrusted TIFF files. The absence of known exploits in the wild currently lowers immediate risk but does not preclude future exploitation attempts.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify all systems and applications that use libtiff, particularly version 4.4.0 or earlier, including embedded systems and third-party software dependencies. 2) Apply the official patch by updating libtiff to a version that includes commit 236b7191 or later. If using precompiled packages, ensure updates from trusted vendors are installed promptly. 3) Implement strict input validation and scanning of TIFF files, especially those received from untrusted sources, to detect and block potentially malicious files. 4) Limit user privileges and restrict the ability to open or process TIFF files in sensitive environments to reduce exposure. 5) Monitor application logs and system behavior for crashes or anomalies related to TIFF processing that could indicate exploitation attempts. 6) Educate users about the risks of opening untrusted image files and enforce policies to minimize such activities. 7) For organizations using automated image processing pipelines, incorporate sandboxing or isolation techniques to contain potential crashes caused by malformed TIFF files.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Switzerland
CVE-2022-3626: Out-of-bounds write in libtiff in libtiff libtiff
Description
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
AI-Powered Analysis
Technical Analysis
CVE-2022-3626 is a medium-severity vulnerability identified in libtiff version 4.4.0 and earlier. The flaw is an out-of-bounds write occurring in the _TIFFmemset function within the libtiff/tif_unix.c source file, specifically at line 340. This function is invoked by processCropSelections in tools/tiffcrop.c at line 7619. The vulnerability arises when processing a specially crafted TIFF image file, which can trigger the out-of-bounds write condition. This memory corruption can lead to a denial-of-service (DoS) condition by crashing the application that uses libtiff to process the malicious TIFF file. The vulnerability does not impact confidentiality or integrity directly but affects availability by causing application crashes. Exploitation requires local access or the ability to supply a crafted TIFF file to an application that uses libtiff for image processing. User interaction is required to open or process the malicious TIFF file. The vulnerability has a CVSS v3.1 base score of 5.5, reflecting its medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No known exploits are reported in the wild, and the fix is available in the source code repository with commit 236b7191. Users compiling libtiff from source should apply this patch to remediate the issue. The vulnerability is categorized under CWE-787 (Out-of-bounds Write).
Potential Impact
For European organizations, the primary impact of CVE-2022-3626 is the potential disruption of services or applications that rely on libtiff for TIFF image processing. This could affect sectors such as media, publishing, scientific research, and any industry using image processing tools that incorporate libtiff. A successful exploit could cause application crashes leading to denial-of-service conditions, potentially interrupting workflows or automated image processing pipelines. Although the vulnerability does not allow data theft or modification, the availability impact could result in operational delays and increased support costs. Organizations that process large volumes of TIFF images or integrate libtiff into critical systems should be particularly vigilant. The requirement for user interaction and local or limited access reduces the risk of widespread remote exploitation but does not eliminate the threat in environments where users handle untrusted TIFF files. The absence of known exploits in the wild currently lowers immediate risk but does not preclude future exploitation attempts.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify all systems and applications that use libtiff, particularly version 4.4.0 or earlier, including embedded systems and third-party software dependencies. 2) Apply the official patch by updating libtiff to a version that includes commit 236b7191 or later. If using precompiled packages, ensure updates from trusted vendors are installed promptly. 3) Implement strict input validation and scanning of TIFF files, especially those received from untrusted sources, to detect and block potentially malicious files. 4) Limit user privileges and restrict the ability to open or process TIFF files in sensitive environments to reduce exposure. 5) Monitor application logs and system behavior for crashes or anomalies related to TIFF processing that could indicate exploitation attempts. 6) Educate users about the risks of opening untrusted image files and enforce policies to minimize such activities. 7) For organizations using automated image processing pipelines, incorporate sandboxing or isolation techniques to contain potential crashes caused by malformed TIFF files.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2022-10-21T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd9795
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 1:24:48 PM
Last updated: 2/7/2026, 1:01:07 PM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.