Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-8534

Опубликовано: 04 авг. 2025
Источник: redhat
CVSS3: 2.5
EPSS Низкий

Описание

A vulnerability classified as problematic was found in libtiff 4.6.0. This vulnerability affects the function PS_Lvl2page of the file tools/tiff2ps.c of the component tiff2ps. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 6ba36f159fd396ad11bf6b7874554197736ecc8b. It is recommended to apply a patch to fix this issue. One of the maintainers explains, that "[t]his error only occurs if DEFER_STRILE_LOAD (defer-strile-load:BOOL=ON) or TIFFOpen( .. "rD") option is used."

A flaw was found in libtiff. The PS_Lvl2page function in tiff2ps.c exhibits a null pointer dereference due to improper handling of input data, potentially allowing a local attacker to trigger a denial of service via a crafted file. This manipulation results in the program attempting to access invalid memory locations. This vulnerability stems from a lack of sufficient validation of data structures.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libtiffFix deferred
Red Hat Enterprise Linux 6libtiffNot affected
Red Hat Enterprise Linux 7compat-libtiff3Not affected
Red Hat Enterprise Linux 7libtiffNot affected
Red Hat Enterprise Linux 8compat-libtiff3Not affected
Red Hat Enterprise Linux 8libtiffNot affected
Red Hat Enterprise Linux 8mingw-libtiffNot affected
Red Hat Enterprise Linux 9libtiffNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-404
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2386450libtiff: Libtiff Null Pointer Dereference Vulnerability

EPSS

Процентиль: 2%
0.00014
Низкий

2.5 Low

CVSS3

Связанные уязвимости

CVSS3: 2.5
ubuntu
20 дней назад

A vulnerability classified as problematic was found in libtiff 4.6.0. This vulnerability affects the function PS_Lvl2page of the file tools/tiff2ps.c of the component tiff2ps. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 6ba36f159fd396ad11bf6b7874554197736ecc8b. It is recommended to apply a patch to fix this issue. One of the maintainers explains, that "[t]his error only occurs if DEFER_STRILE_LOAD (defer-strile-load:BOOL=ON) or TIFFOpen( .. "rD") option is used."

CVSS3: 2.5
nvd
20 дней назад

A vulnerability classified as problematic was found in libtiff 4.6.0. This vulnerability affects the function PS_Lvl2page of the file tools/tiff2ps.c of the component tiff2ps. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 6ba36f159fd396ad11bf6b7874554197736ecc8b. It is recommended to apply a patch to fix this issue. One of the maintainers explains, that "[t]his error only occurs if DEFER_STRILE_LOAD (defer-strile-load:BOOL=ON) or TIFFOpen( .. "rD") option is used."

CVSS3: 2.5
debian
20 дней назад

A vulnerability classified as problematic was found in libtiff 4.6.0. ...

CVSS3: 2.5
github
20 дней назад

A vulnerability classified as problematic was found in libtiff 4.6.0. This vulnerability affects the function PS_Lvl2page of the file tools/tiff2ps.c of the component tiff2ps. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 6ba36f159fd396ad11bf6b7874554197736ecc8b. It is recommended to apply a patch to fix this issue. One of the maintainers explains, that "[t]his error only occurs if DEFER_STRILE_LOAD (defer-strile-load:BOOL=ON) or TIFFOpen( .. "rD") option is used."

EPSS

Процентиль: 2%
0.00014
Низкий

2.5 Low

CVSS3