Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-8534

Опубликовано: 05 авг. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 1
CVSS3: 2.5

Описание

A vulnerability classified as problematic was found in libtiff 4.6.0. This vulnerability affects the function PS_Lvl2page of the file tools/tiff2ps.c of the component tiff2ps. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 6ba36f159fd396ad11bf6b7874554197736ecc8b. It is recommended to apply a patch to fix this issue. One of the maintainers explains, that "[t]his error only occurs if DEFER_STRILE_LOAD (defer-strile-load:BOOL=ON) or TIFFOpen( .. "rD") option is used."

РелизСтатусПримечание
devel

not-affected

uses system tiff
esm-apps/bionic

not-affected

uses system tiff
esm-apps/focal

not-affected

uses system tiff
esm-apps/jammy

not-affected

uses system tiff
esm-apps/noble

not-affected

uses system tiff
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

needs-triage

jammy

not-affected

uses system tiff
noble

not-affected

uses system tiff
plucky

not-affected

uses system tiff

Показывать по

РелизСтатусПримечание
devel

not-affected

dropped embedded libtiff
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

not-affected

dropped embedded libtiff
jammy

needs-triage

noble

not-affected

dropped embedded libtiff
plucky

not-affected

dropped embedded libtiff
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

jammy

needs-triage

noble

needs-triage

plucky

needs-triage

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

jammy

needs-triage

noble

needs-triage

plucky

needs-triage

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

released

4.7.0-3ubuntu2
esm-infra-legacy/trusty

released

4.0.3-7ubuntu0.11+esm15
esm-infra/bionic

released

4.0.9-5ubuntu0.10+esm8
esm-infra/focal

released

4.1.0+git191117-2ubuntu0.20.04.14+esm1
esm-infra/xenial

released

4.0.6-1ubuntu0.8+esm18
jammy

released

4.3.0-6ubuntu0.11
noble

released

4.5.1+git230720-4ubuntu2.3
plucky

released

4.5.1+git230720-4ubuntu4.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 2%
0.00014
Низкий

1 Low

CVSS2

2.5 Low

CVSS3

Связанные уязвимости

CVSS3: 2.5
redhat
20 дней назад

A vulnerability classified as problematic was found in libtiff 4.6.0. This vulnerability affects the function PS_Lvl2page of the file tools/tiff2ps.c of the component tiff2ps. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 6ba36f159fd396ad11bf6b7874554197736ecc8b. It is recommended to apply a patch to fix this issue. One of the maintainers explains, that "[t]his error only occurs if DEFER_STRILE_LOAD (defer-strile-load:BOOL=ON) or TIFFOpen( .. "rD") option is used."

CVSS3: 2.5
nvd
20 дней назад

A vulnerability classified as problematic was found in libtiff 4.6.0. This vulnerability affects the function PS_Lvl2page of the file tools/tiff2ps.c of the component tiff2ps. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 6ba36f159fd396ad11bf6b7874554197736ecc8b. It is recommended to apply a patch to fix this issue. One of the maintainers explains, that "[t]his error only occurs if DEFER_STRILE_LOAD (defer-strile-load:BOOL=ON) or TIFFOpen( .. "rD") option is used."

CVSS3: 2.5
debian
20 дней назад

A vulnerability classified as problematic was found in libtiff 4.6.0. ...

CVSS3: 2.5
github
20 дней назад

A vulnerability classified as problematic was found in libtiff 4.6.0. This vulnerability affects the function PS_Lvl2page of the file tools/tiff2ps.c of the component tiff2ps. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 6ba36f159fd396ad11bf6b7874554197736ecc8b. It is recommended to apply a patch to fix this issue. One of the maintainers explains, that "[t]his error only occurs if DEFER_STRILE_LOAD (defer-strile-load:BOOL=ON) or TIFFOpen( .. "rD") option is used."

CVSS3: 2.5
fstec
около 1 месяца назад

Уязвимость функции PS_Lvl2page() библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 2%
0.00014
Низкий

1 Low

CVSS2

2.5 Low

CVSS3