{"id":"CVE-2022-1623","details":"LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:624, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.","modified":"2026-02-10T23:48:36.643543Z","published":"2022-05-11T00:00:00Z","related":["MGASA-2022-0240"],"database_specific":{"cna_assigner":"GitLab","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/1xxx/CVE-2022-1623.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/1xxx/CVE-2022-1623.json"},{"type":"WEB","url":"https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-1623.json"},{"type":"FIX","url":"https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a"},{"type":"REPORT","url":"https://gitlab.com/libtiff/libtiff/-/issues/410"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C7IWZTB4J2N4F5OR5QY4VHDSKWKZSWN3/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXAFOP6QQRNZD3HPZ6BMCEZZOM4YIZMK/"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1623"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202210-10"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220616-0005/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5333"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/libtiff/libtiff","events":[{"introduced":"0"},{"fixed":"b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a"}]}],"versions":["v3.5.3","v3.5.4","v3.5.5","v3.5.7","v3.6.0","v3.6.0beta2","v3.6.1","v3.7.0","v3.7.0alpha","v3.7.0beta","v3.7.0beta2","v3.7.1","v3.7.2","v3.7.3","v3.7.4","v3.8.0","v3.8.1","v3.8.2","v4.0.0","v4.0.0alpha","v4.0.0alpha4","v4.0.0alpha5","v4.0.0alpha6","v4.0.0beta7","v4.0.1","v4.0.10","v4.0.2","v4.0.3","v4.0.4","v4.0.4beta","v4.0.5","v4.0.6","v4.0.7","v4.0.8","v4.0.9","v4.1.0","v4.2.0","v4.3.0","v4.3.0rc1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1623.json","vanir_signatures":[{"source":"https://gitlab.com/libtiff/libtiff@b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a","signature_type":"Function","target":{"function":"LZWPreDecode","file":"libtiff/tif_lzw.c"},"signature_version":"v1","id":"CVE-2022-1623-9b318011","digest":{"function_hash":"99610717102855534426409033808273071332","length":1508},"deprecated":false},{"source":"https://gitlab.com/libtiff/libtiff@b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a","signature_type":"Line","target":{"file":"libtiff/tif_lzw.c"},"signature_version":"v1","id":"CVE-2022-1623-d7cd34c9","digest":{"threshold":0.9,"line_hashes":["297304205499719229723862582735391797184","15433957502830867365031511810630214268","212246105566467323765702300287524938539","57201324518598256529912329638284093607","924326278261024855579029760551291294","198651057446999146972310869395586213217","259002140627107494332398747423618063596","324067406375592853659512906454570304710","248811850483569804806380334611492579744","95910564819394607255018754234021125078","291220921187703762238360898628621394452","3648640367411898551406150155254360071","129680571501969712790997894156773833199","164715822644765660797502729876167356518","252580422337327598812012930021645676916","151754513886909563869075708452516409737"]},"deprecated":false},{"source":"https://gitlab.com/libtiff/libtiff@b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a","signature_type":"Function","target":{"function":"LZWDecode","file":"libtiff/tif_lzw.c"},"signature_version":"v1","id":"CVE-2022-1623-dd5d9e10","digest":{"function_hash":"63749783208390883576011996837381271528","length":5343},"deprecated":false}]}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}