CVE-2025-8177

A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*

History

11 Sep 2025, 16:57

Type Values Removed Values Added
First Time Libtiff
Libtiff libtiff
CPE cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*
References () http://www.libtiff.org/ - () http://www.libtiff.org/ - Product
References () https://gitlab.com/libtiff/libtiff/-/commit/e8c9d6c616b19438695fd829e58ae4fde5bfbc22 - () https://gitlab.com/libtiff/libtiff/-/commit/e8c9d6c616b19438695fd829e58ae4fde5bfbc22 - Patch
References () https://gitlab.com/libtiff/libtiff/-/issues/715 - () https://gitlab.com/libtiff/libtiff/-/issues/715 - Exploit, Issue Tracking, Vendor Advisory
References () https://gitlab.com/libtiff/libtiff/-/merge_requests/737 - () https://gitlab.com/libtiff/libtiff/-/merge_requests/737 - Product
References () https://vuldb.com/?ctiid.317591 - () https://vuldb.com/?ctiid.317591 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.317591 - () https://vuldb.com/?id.317591 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.621797 - () https://vuldb.com/?submit.621797 - Third Party Advisory, VDB Entry

28 Jul 2025, 19:15

Type Values Removed Values Added
References () https://gitlab.com/libtiff/libtiff/-/issues/715 - () https://gitlab.com/libtiff/libtiff/-/issues/715 -
References () https://vuldb.com/?submit.621797 - () https://vuldb.com/?submit.621797 -
Summary
  • (es) Se encontró una vulnerabilidad en LibTIFF hasta la versión 4.7.0. Se ha clasificado como crítica. Este problema afecta a la función setrow del archivo tools/thumbnail.c. La manipulación provoca un desbordamiento del búfer. Es necesario abordar un ataque localmente. El parche se llama e8c9d6c616b19438695fd829e58ae4fde5bfbc22. Se recomienda aplicar un parche para solucionar este problema. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante.

26 Jul 2025, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-26 04:16

Updated : 2025-09-11 16:57


NVD link : CVE-2025-8177

Mitre link : CVE-2025-8177

CVE.ORG link : CVE-2025-8177


JSON object : View

Products Affected

libtiff

  • libtiff
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')