| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.8 | $0-$5k | 0.44 |
Summary
A vulnerability identified as problematic has been detected in LibTIFF 4.3.0. This affects an unknown function of the component tiffcrop. Performing a manipulation results in divide by zero. This vulnerability was named CVE-2022-0909. The attack may be initiated remotely. There is no available exploit. To fix this issue, it is recommended to deploy a patch.
Details
A vulnerability, which was classified as problematic, was found in LibTIFF 4.3.0 (Image Processing Software). This affects some unknown functionality of the component tiffcrop. The manipulation with an unknown input leads to a divide by zero vulnerability. CWE is classifying the issue as CWE-369. The product divides a value by zero. This is going to have an impact on availability.
The weakness was presented 03/11/2022 as 393. It is possible to read the advisory at gitlab.com. This vulnerability is uniquely identified as CVE-2022-0909 since 03/10/2022. It demands that the victim is doing some kind of user interaction. The technical details are unknown and an exploit is not publicly available. The attack technique deployed by this issue is T1499 according to MITRE ATT&CK.
The vulnerability scanner Nessus provides a plugin with the ID 274520 (Oracle Linux 8 : mingw-libtiff (ELSA-2025-19906)), which helps to determine the existence of the flaw in a target environment.
Applying a patch is able to eliminate this problem.
The vulnerability is also documented in the databases at Tenable (274520) and EUVD (EUVD-2022-15939). Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Name
Version
License
Website
- Product: http://www.libtiff.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.9VulDB Meta Temp Score: 4.8
VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CNA Base Score: 5.5
CNA Vector (GitLab Inc.): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Divide by zeroCWE: CWE-369 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 274520
Nessus Name: Oracle Linux 8 : mingw-libtiff (ELSA-2025-19906)
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Timeline
03/10/2022 🔍03/11/2022 🔍
03/11/2022 🔍
03/31/2026 🔍
Sources
Product: libtiff.orgAdvisory: 393
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2022-0909 (🔍)
GCVE (CVE): GCVE-0-2022-0909
GCVE (VulDB): GCVE-100-194763
EUVD: 🔍
Entry
Created: 03/11/2022 21:32Updated: 03/31/2026 12:42
Changes: 03/11/2022 21:32 (50), 03/14/2022 13:56 (1), 11/11/2025 16:04 (16), 03/31/2026 12:42 (1)
Complete: 🔍
Cache ID: 216:A06:103
No comments yet. Languages: en.
Please log in to comment.