Количество 43
Количество 43
CVE-2025-8177
A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-8177
A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2025-8177
LibTIFF thumbnail.c setrow buffer overflow
CVE-2025-8177
A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as ...
CVE-2025-9900
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
CVE-2025-9900
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
CVE-2025-9900
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
CVE-2025-9900
Libtiff: libtiff write-what-where
CVE-2025-9900
A flaw was found in Libtiff. This vulnerability is a "write-what-where ...
GHSA-w743-578r-x56m
A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer.
BDU:2025-13920
Уязвимость функции setrow библиотеки LibTIFF, позволяющая нарушителю выполнить произвольный код
SUSE-SU-2025:3961-1
Security update for tiff
SUSE-SU-2025:3941-1
Security update for tiff
RLSA-2025:19156
Important: libtiff security update
RLSA-2025:17675
Important: compat-libtiff3 security update
GHSA-qc8j-wvjf-7jfj
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
ELSA-2025-20998
ELSA-2025-20998: libtiff security update (IMPORTANT)
ELSA-2025-19276
ELSA-2025-19276: libtiff security update (IMPORTANT)
ELSA-2025-19156
ELSA-2025-19156: libtiff security update (IMPORTANT)
ELSA-2025-17710
ELSA-2025-17710: compat-libtiff3 security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-8177 A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer. | CVSS3: 5.3 | 0% Низкий | 6 месяцев назад | |
CVE-2025-8177 A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer. | CVSS3: 5.3 | 0% Низкий | 6 месяцев назад | |
CVE-2025-8177 LibTIFF thumbnail.c setrow buffer overflow | CVSS3: 5.3 | 0% Низкий | 4 месяца назад | |
CVE-2025-8177 A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as ... | CVSS3: 5.3 | 0% Низкий | 6 месяцев назад | |
CVE-2025-9900 A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user. | CVSS3: 8.8 | 0% Низкий | 4 месяца назад | |
CVE-2025-9900 A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user. | CVSS3: 8.8 | 0% Низкий | 4 месяца назад | |
CVE-2025-9900 A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user. | CVSS3: 8.8 | 0% Низкий | 4 месяца назад | |
CVE-2025-9900 Libtiff: libtiff write-what-where | CVSS3: 8.8 | 0% Низкий | 4 месяца назад | |
CVE-2025-9900 A flaw was found in Libtiff. This vulnerability is a "write-what-where ... | CVSS3: 8.8 | 0% Низкий | 4 месяца назад | |
GHSA-w743-578r-x56m A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer. | CVSS3: 5.3 | 0% Низкий | 6 месяцев назад | |
BDU:2025-13920 Уязвимость функции setrow библиотеки LibTIFF, позволяющая нарушителю выполнить произвольный код | CVSS3: 5.3 | 0% Низкий | 6 месяцев назад | |
SUSE-SU-2025:3961-1 Security update for tiff | 0% Низкий | 2 месяца назад | ||
SUSE-SU-2025:3941-1 Security update for tiff | 0% Низкий | 2 месяца назад | ||
RLSA-2025:19156 Important: libtiff security update | 0% Низкий | 2 месяца назад | ||
RLSA-2025:17675 Important: compat-libtiff3 security update | 0% Низкий | 3 месяца назад | ||
GHSA-qc8j-wvjf-7jfj A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user. | CVSS3: 8.8 | 0% Низкий | 4 месяца назад | |
ELSA-2025-20998 ELSA-2025-20998: libtiff security update (IMPORTANT) | около 1 месяца назад | |||
ELSA-2025-19276 ELSA-2025-19276: libtiff security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-19156 ELSA-2025-19156: libtiff security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-17710 ELSA-2025-17710: compat-libtiff3 security update (IMPORTANT) | 3 месяца назад |
Уязвимостей на страницу