{"id":"CVE-2022-2869","details":"libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation.","modified":"2026-05-15T11:54:39.467965081Z","published":"2022-08-17T00:00:00Z","related":["ALSA-2023:0095","SUSE-SU-2022:3679-1","SUSE-SU-2022:3690-1","openSUSE-SU-2024:13381-1"],"database_specific":{"cna_assigner":"redhat","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/2xxx/CVE-2022-2869.json","cwe_ids":["CWE-191"],"unresolved_ranges":[{"source":"AFFECTED_FIELD","extracted_events":[{"last_affected":"libtiff 4.4.0rc1"}]}]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/2xxx/CVE-2022-2869.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2869"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5333"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2118869"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"}],"schema_version":"1.7.5"}