PT-2022-6799 · Unknown +2 · Openimageio +2
Lilith >_>
·
Published
2022-10-19
·
Updated
2025-06-23
·
CVE-2022-41639
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
OpenImageIO versions master-branch-9aeece7a through v2.3.19.0
Description:
A heap-based buffer overflow vulnerability exists in the tile decoding code of the TIFF image parser. This issue can be triggered by a specially-crafted TIFF file, leading to out-of-bounds memory corruption, which can result in arbitrary code execution. An attacker can provide a malicious file to exploit this vulnerability, potentially allowing remote access to confidential data, disrupting data integrity, and causing a denial of service.
Recommendations:
For OpenImageIO versions master-branch-9aeece7a through v2.3.19.0, consider disabling the TIFF image parser until a patch is available to prevent exploitation. Restrict access to the tile decoding code to minimize the risk of arbitrary code execution. Avoid using the vulnerable TIFF image parser with untrusted files until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
Heap Based Buffer Overflow
Memory Corruption
Related Identifiers
Affected Products
References · 108
- 🔥 https://talosintelligence.com/vulnerability_reports/TALOS-2022-1633 · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41639 · Security Note
- https://osv.dev/vulnerability/DLA-3382-1 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43598 · Security Note
- https://bdu.fstec.ru/vul/2023-04809 · Security Note
- https://bdu.fstec.ru/vul/2023-04793 · Security Note
- https://wiki.astralinux.ru/pages/viewpage.action?pageId=263044493 · Vendor Advisory
- https://bdu.fstec.ru/vul/2023-07635 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43601 · Security Note
- https://bdu.fstec.ru/vul/2023-04800 · Security Note
- https://bdu.fstec.ru/vul/2023-04806 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41977 · Security Note
- https://osv.dev/vulnerability/CVE-2022-41639 · Vendor Advisory
- https://debian.org/security/2023/dsa-5384 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41988 · Security Note