A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file.
By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
References
Configurations
No configuration.
History
13 Oct 2025, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
09 Oct 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
09 Oct 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
23 Sep 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file - |
23 Sep 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-23 17:15
Updated : 2025-10-13 02:15
NVD link : CVE-2025-9900
Mitre link : CVE-2025-9900
CVE.ORG link : CVE-2025-9900
JSON object : View
Products Affected
No product.
CWE
CWE-123
Write-what-where Condition
