CVE-2022-3626: Out-of-bounds write in libtiff in libtiff libtiff
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
AI Analysis
Technical Summary
CVE-2022-3626 is a medium-severity vulnerability identified in libtiff version 4.4.0 and earlier. The flaw is an out-of-bounds write occurring in the _TIFFmemset function within the libtiff/tif_unix.c source file, specifically at line 340. This function is invoked by processCropSelections in tools/tiffcrop.c at line 7619. The vulnerability arises when processing a specially crafted TIFF image file, which can trigger the out-of-bounds write condition. This memory corruption can lead to a denial-of-service (DoS) condition by crashing the application that uses libtiff to process the malicious TIFF file. The vulnerability does not impact confidentiality or integrity directly but affects availability by causing application crashes. Exploitation requires local access or the ability to supply a crafted TIFF file to an application that uses libtiff for image processing. User interaction is required to open or process the malicious TIFF file. The vulnerability has a CVSS v3.1 base score of 5.5, reflecting its medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No known exploits are reported in the wild, and the fix is available in the source code repository with commit 236b7191. Users compiling libtiff from source should apply this patch to remediate the issue. The vulnerability is categorized under CWE-787 (Out-of-bounds Write).
Potential Impact
For European organizations, the primary impact of CVE-2022-3626 is the potential disruption of services or applications that rely on libtiff for TIFF image processing. This could affect sectors such as media, publishing, scientific research, and any industry using image processing tools that incorporate libtiff. A successful exploit could cause application crashes leading to denial-of-service conditions, potentially interrupting workflows or automated image processing pipelines. Although the vulnerability does not allow data theft or modification, the availability impact could result in operational delays and increased support costs. Organizations that process large volumes of TIFF images or integrate libtiff into critical systems should be particularly vigilant. The requirement for user interaction and local or limited access reduces the risk of widespread remote exploitation but does not eliminate the threat in environments where users handle untrusted TIFF files. The absence of known exploits in the wild currently lowers immediate risk but does not preclude future exploitation attempts.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify all systems and applications that use libtiff, particularly version 4.4.0 or earlier, including embedded systems and third-party software dependencies. 2) Apply the official patch by updating libtiff to a version that includes commit 236b7191 or later. If using precompiled packages, ensure updates from trusted vendors are installed promptly. 3) Implement strict input validation and scanning of TIFF files, especially those received from untrusted sources, to detect and block potentially malicious files. 4) Limit user privileges and restrict the ability to open or process TIFF files in sensitive environments to reduce exposure. 5) Monitor application logs and system behavior for crashes or anomalies related to TIFF processing that could indicate exploitation attempts. 6) Educate users about the risks of opening untrusted image files and enforce policies to minimize such activities. 7) For organizations using automated image processing pipelines, incorporate sandboxing or isolation techniques to contain potential crashes caused by malformed TIFF files.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Switzerland
CVE-2022-3626: Out-of-bounds write in libtiff in libtiff libtiff
Description
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
AI-Powered Analysis
Technical Analysis
CVE-2022-3626 is a medium-severity vulnerability identified in libtiff version 4.4.0 and earlier. The flaw is an out-of-bounds write occurring in the _TIFFmemset function within the libtiff/tif_unix.c source file, specifically at line 340. This function is invoked by processCropSelections in tools/tiffcrop.c at line 7619. The vulnerability arises when processing a specially crafted TIFF image file, which can trigger the out-of-bounds write condition. This memory corruption can lead to a denial-of-service (DoS) condition by crashing the application that uses libtiff to process the malicious TIFF file. The vulnerability does not impact confidentiality or integrity directly but affects availability by causing application crashes. Exploitation requires local access or the ability to supply a crafted TIFF file to an application that uses libtiff for image processing. User interaction is required to open or process the malicious TIFF file. The vulnerability has a CVSS v3.1 base score of 5.5, reflecting its medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No known exploits are reported in the wild, and the fix is available in the source code repository with commit 236b7191. Users compiling libtiff from source should apply this patch to remediate the issue. The vulnerability is categorized under CWE-787 (Out-of-bounds Write).
Potential Impact
For European organizations, the primary impact of CVE-2022-3626 is the potential disruption of services or applications that rely on libtiff for TIFF image processing. This could affect sectors such as media, publishing, scientific research, and any industry using image processing tools that incorporate libtiff. A successful exploit could cause application crashes leading to denial-of-service conditions, potentially interrupting workflows or automated image processing pipelines. Although the vulnerability does not allow data theft or modification, the availability impact could result in operational delays and increased support costs. Organizations that process large volumes of TIFF images or integrate libtiff into critical systems should be particularly vigilant. The requirement for user interaction and local or limited access reduces the risk of widespread remote exploitation but does not eliminate the threat in environments where users handle untrusted TIFF files. The absence of known exploits in the wild currently lowers immediate risk but does not preclude future exploitation attempts.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify all systems and applications that use libtiff, particularly version 4.4.0 or earlier, including embedded systems and third-party software dependencies. 2) Apply the official patch by updating libtiff to a version that includes commit 236b7191 or later. If using precompiled packages, ensure updates from trusted vendors are installed promptly. 3) Implement strict input validation and scanning of TIFF files, especially those received from untrusted sources, to detect and block potentially malicious files. 4) Limit user privileges and restrict the ability to open or process TIFF files in sensitive environments to reduce exposure. 5) Monitor application logs and system behavior for crashes or anomalies related to TIFF processing that could indicate exploitation attempts. 6) Educate users about the risks of opening untrusted image files and enforce policies to minimize such activities. 7) For organizations using automated image processing pipelines, incorporate sandboxing or isolation techniques to contain potential crashes caused by malformed TIFF files.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2022-10-21T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd9795
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 1:24:48 PM
Last updated: 8/1/2025, 6:32:23 AM
Views: 14
Related Threats
CVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.