CVE-2022-3627: Out-of-bounds read in libtiff in libtiff libtiff
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
AI Analysis
Technical Summary
CVE-2022-3627 is a medium-severity vulnerability identified in libtiff version 4.4.0 and earlier. The flaw is an out-of-bounds write occurring in the _TIFFmemcpy function within the libtiff/tif_unix.c source file, specifically at line 346. This function is invoked by extractImageSection in tools/tiffcrop.c at line 6860. The vulnerability arises when processing crafted TIFF image files, allowing an attacker to trigger a denial-of-service (DoS) condition by causing the application to write outside the bounds of allocated memory. This can lead to application crashes or instability. The vulnerability does not affect confidentiality or integrity directly but impacts availability by crashing applications that use the vulnerable libtiff library to process malicious TIFF files. Exploitation requires local access or user interaction to open or process a malicious TIFF file, as indicated by the CVSS vector (AV:L/UI:R). No privileges are required to exploit this vulnerability, but user interaction is necessary. The vulnerability has a CVSS v3.1 base score of 5.5, reflecting a medium severity level. The issue is tracked under CWE-787 (Out-of-bounds Write). A fix has been committed (commit 236b7191) for users compiling libtiff from source. No known exploits are reported in the wild as of the published date. This vulnerability primarily affects software and systems that rely on libtiff for TIFF image processing, including image viewers, editors, and other multimedia applications that handle TIFF files.
Potential Impact
For European organizations, the impact of CVE-2022-3627 is primarily related to service availability and operational continuity. Organizations that use software dependent on libtiff for image processing—such as digital media companies, publishing houses, scientific research institutions, and government agencies handling geospatial or medical imaging—may experience application crashes or service interruptions if malicious TIFF files are processed. While the vulnerability does not lead to data breaches or unauthorized data modification, denial-of-service conditions can disrupt workflows, cause downtime, and potentially impact business operations. Given the requirement for user interaction, phishing or social engineering campaigns could be used to deliver malicious TIFF files to targeted users, increasing risk in environments with less stringent file handling policies. The vulnerability's medium severity suggests it is less critical than remote code execution flaws but still warrants timely remediation to prevent disruption, especially in sectors where image processing is integral to operations.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Identify all software and systems that incorporate libtiff version 4.4.0 or earlier, including embedded systems and third-party applications. 2) Apply the official patch or upgrade libtiff to a fixed version that includes commit 236b7191 or later. For organizations compiling from source, ensure the updated source is used. 3) Implement strict file validation and filtering controls to block or quarantine suspicious TIFF files, especially those received from untrusted sources or via email attachments. 4) Educate users about the risks of opening unsolicited image files and enforce policies to limit user interaction with unverified content. 5) Monitor application logs and system behavior for crashes or anomalies related to TIFF file processing to detect potential exploitation attempts. 6) Where feasible, sandbox or isolate image processing components to contain potential crashes and prevent cascading failures. 7) Coordinate with software vendors to ensure timely updates and security advisories are applied. These targeted actions go beyond generic advice by focusing on inventory, patching, user awareness, and proactive detection specific to libtiff and TIFF file handling.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2022-3627: Out-of-bounds read in libtiff in libtiff libtiff
Description
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
AI-Powered Analysis
Technical Analysis
CVE-2022-3627 is a medium-severity vulnerability identified in libtiff version 4.4.0 and earlier. The flaw is an out-of-bounds write occurring in the _TIFFmemcpy function within the libtiff/tif_unix.c source file, specifically at line 346. This function is invoked by extractImageSection in tools/tiffcrop.c at line 6860. The vulnerability arises when processing crafted TIFF image files, allowing an attacker to trigger a denial-of-service (DoS) condition by causing the application to write outside the bounds of allocated memory. This can lead to application crashes or instability. The vulnerability does not affect confidentiality or integrity directly but impacts availability by crashing applications that use the vulnerable libtiff library to process malicious TIFF files. Exploitation requires local access or user interaction to open or process a malicious TIFF file, as indicated by the CVSS vector (AV:L/UI:R). No privileges are required to exploit this vulnerability, but user interaction is necessary. The vulnerability has a CVSS v3.1 base score of 5.5, reflecting a medium severity level. The issue is tracked under CWE-787 (Out-of-bounds Write). A fix has been committed (commit 236b7191) for users compiling libtiff from source. No known exploits are reported in the wild as of the published date. This vulnerability primarily affects software and systems that rely on libtiff for TIFF image processing, including image viewers, editors, and other multimedia applications that handle TIFF files.
Potential Impact
For European organizations, the impact of CVE-2022-3627 is primarily related to service availability and operational continuity. Organizations that use software dependent on libtiff for image processing—such as digital media companies, publishing houses, scientific research institutions, and government agencies handling geospatial or medical imaging—may experience application crashes or service interruptions if malicious TIFF files are processed. While the vulnerability does not lead to data breaches or unauthorized data modification, denial-of-service conditions can disrupt workflows, cause downtime, and potentially impact business operations. Given the requirement for user interaction, phishing or social engineering campaigns could be used to deliver malicious TIFF files to targeted users, increasing risk in environments with less stringent file handling policies. The vulnerability's medium severity suggests it is less critical than remote code execution flaws but still warrants timely remediation to prevent disruption, especially in sectors where image processing is integral to operations.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Identify all software and systems that incorporate libtiff version 4.4.0 or earlier, including embedded systems and third-party applications. 2) Apply the official patch or upgrade libtiff to a fixed version that includes commit 236b7191 or later. For organizations compiling from source, ensure the updated source is used. 3) Implement strict file validation and filtering controls to block or quarantine suspicious TIFF files, especially those received from untrusted sources or via email attachments. 4) Educate users about the risks of opening unsolicited image files and enforce policies to limit user interaction with unverified content. 5) Monitor application logs and system behavior for crashes or anomalies related to TIFF file processing to detect potential exploitation attempts. 6) Where feasible, sandbox or isolate image processing components to contain potential crashes and prevent cascading failures. 7) Coordinate with software vendors to ensure timely updates and security advisories are applied. These targeted actions go beyond generic advice by focusing on inventory, patching, user awareness, and proactive detection specific to libtiff and TIFF file handling.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitLab
- Date Reserved
- 2022-10-21T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd97bf
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 1:26:06 PM
Last updated: 2/7/2026, 8:20:26 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.