{"id":"JLSEC-2025-275","summary":"A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0","details":"A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file parsed by the \"tiffsplit\" or \"tiffcrop\" utilities.","modified":"2025-11-25T22:48:11.159966Z","published":"2025-11-25T22:18:43.603Z","upstream":["CVE-2022-34526"],"database_specific":{"license":"CC-BY-4.0","sources":[{"id":"CVE-2022-34526","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-34526","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-34526","imported":"2025-11-25T21:56:30.623Z","published":"2022-07-29T23:15:08.113Z","modified":"2024-11-21T07:09:42.100Z"}]},"references":[{"type":"WEB","url":"https://gitlab.com/libtiff/libtiff/-/issues/433"},{"type":"WEB","url":"https://gitlab.com/libtiff/libtiff/-/issues/486"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00018.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FC6LWPAEKYJ57LSHX4SBFMLRMLOZTHIJ/"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220930-0002/"},{"type":"WEB","url":"https://www.debian.org/security/2023/dsa-5333"}],"affected":[{"package":{"name":"Libtiff_jll","ecosystem":"Julia","purl":"pkg:julia/Libtiff_jll?uuid=89763e89-9b03-5906-acba-b20f662cd828"},"ranges":[{"type":"SEMVER","events":[{"introduced":"4.4.0+0"},{"fixed":"4.5.1+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-275.json"}}],"schema_version":"1.7.3"}