LibTIFF up to 4.7.0 tools/thumbnail.c setrow buffer overflow

Summaryinfo

A vulnerability, which was classified as critical, has been found in LibTIFF up to 4.7.0. Affected is the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer. This vulnerability is documented as CVE-2025-8177. The attack needs to be performed locally. There is not any exploit available. It is recommended to apply a patch to fix this issue.

Detailsinfo

A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation with an unknown input leads to a buffer overflow vulnerability. Using CWE to declare the problem leads to CWE-120. The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow. Impacted is confidentiality, integrity, and availability.

It is possible to read the advisory at gitlab.com. The identification of this vulnerability is CVE-2025-8177. The exploitation is known to be easy. Attacking locally is a requirement. Technical details of the vulnerability are known, but there is no available exploit.

The vulnerability scanner Nessus provides a plugin with the ID 243211 (Fedora 42 : libtiff (2025-7d08872494)), which helps to determine the existence of the flaw in a target environment.

Applying the patch e8c9d6c616b19438695fd829e58ae4fde5bfbc22 is able to eliminate this problem. The bugfix is ready for download at gitlab.com.

The vulnerability is also documented in the databases at Tenable (243211), EUVD (EUVD-2025-22770) and CERT Bund (WID-SEC-2025-1654). Be aware that VulDB is the high quality source for vulnerability data.

Affected

  • Amazon Linux 2
  • Red Hat Enterprise Linux
  • Fedora Linux
  • Ubuntu Linux
  • SUSE Linux
  • Oracle Linux
  • SUSE openSUSE
  • RESF Rocky Linux
  • Dell Avamar
  • Open Source libTIFF
  • Dell NetWorker

Productinfo

Type

Name

Version

License

Support

Website

CPE 2.3info

CPE 2.2info

CVSSv4info

VulDB Vector: 🔒
VulDB Reliability: 🔍

CNA CVSS-B Score: 🔒
CNA CVSS-BT Score: 🔒
CNA Vector: 🔒

CVSSv3info

VulDB Meta Base Score: 6.1
VulDB Meta Temp Score: 6.1

VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔒
VulDB Reliability: 🔍

NVD Base Score: 7.8
NVD Vector: 🔒

CNA Base Score: 5.3
CNA Vector: 🔒

CVSSv2info

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VectorComplexityAuthenticationConfidentialityIntegrityAvailability
UnlockUnlockUnlockUnlockUnlockUnlock
UnlockUnlockUnlockUnlockUnlockUnlock
UnlockUnlockUnlockUnlockUnlockUnlock

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍

Exploitinginfo

Class: Buffer overflow
CWE: CWE-120 / CWE-119
CAPEC: 🔒
ATT&CK: 🔒

Physical: Partially
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

EPSS Score: 🔒
EPSS Percentile: 🔒

Price Prediction: 🔍
Current Price Estimation: 🔒

0-DayUnlockUnlockUnlockUnlock
TodayUnlockUnlockUnlockUnlock

Nessus ID: 243211
Nessus Name: Fedora 42 : libtiff (2025-7d08872494)

Threat Intelligenceinfo

Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍

Countermeasuresinfo

Recommended: Patch
Status: 🔍

0-Day Time: 🔒

Patch: e8c9d6c616b19438695fd829e58ae4fde5bfbc22

Timelineinfo

07/25/2025 Advisory disclosed
07/25/2025 +0 days VulDB entry created
12/02/2025 +130 days VulDB entry last update

Sourcesinfo

Product: libtiff.org

Advisory: 715
Status: Confirmed
Confirmation: 🔒

CVE: CVE-2025-8177 (🔒)
GCVE (CVE): GCVE-0-2025-8177
GCVE (VulDB): GCVE-100-317591
EUVD: 🔒
CERT Bund: WID-SEC-2025-1654 - libTIFF (Tiffmedian, Thumbnail): Mehrere Schwachstellen

Entryinfo

Created: 07/25/2025 10:16
Updated: 12/02/2025 18:00
Changes: 07/25/2025 10:16 (58), 07/26/2025 06:50 (30), 07/26/2025 19:37 (1), 07/28/2025 21:39 (1), 07/31/2025 07:30 (2), 08/08/2025 16:16 (7), 09/11/2025 19:14 (11), 11/02/2025 15:36 (1), 12/02/2025 18:00 (1)
Complete: 🔍
Submitter: arthurx
Cache ID: 216::103

Submitinfo

Accepted

Be aware that VulDB is the high quality source for vulnerability data.

Discussion

No comments yet. Languages: en.

Please log in to comment.

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!