A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer.
References
| Link | Resource |
|---|---|
| http://www.libtiff.org/ | Product |
| https://gitlab.com/libtiff/libtiff/-/commit/e8c9d6c616b19438695fd829e58ae4fde5bfbc22 | Patch |
| https://gitlab.com/libtiff/libtiff/-/issues/715 | Exploit Issue Tracking Vendor Advisory |
| https://gitlab.com/libtiff/libtiff/-/merge_requests/737 | Product |
| https://vuldb.com/?ctiid.317591 | Permissions Required VDB Entry |
| https://vuldb.com/?id.317591 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.621797 | Third Party Advisory VDB Entry |
| https://gitlab.com/libtiff/libtiff/-/issues/715 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?submit.621797 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-07-26 04:16
Updated : 2025-09-11 16:57
NVD link : CVE-2025-8177
Mitre link : CVE-2025-8177
CVE.ORG link : CVE-2025-8177
JSON object : View
Products Affected
libtiff
- libtiff
