CVE-2025-9900 (CNNVD-202509-3630)

HIGH
中文标题:
LibTIFF 安全漏洞
英文标题:
Libtiff: libtiff write-what-where
CVSS分数: 8.8
发布时间: 2025-09-23 16:26:22
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

LibTIFF是LibTIFF开源的一个读写TIFF(标签图像文件格式)文件的库。该库包含一些处理TIFF文件的命令行工具。 LibTIFF存在安全漏洞,该漏洞源于可进行任意写入操作。

英文描述:

A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.

CWE类型:
CWE-123
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Red Hat Red Hat Enterprise Linux 10 - - - cpe:/o:redhat:enterprise_linux:10.0
Red Hat Red Hat Enterprise Linux 7 Extended Lifecycle Support - - - cpe:/o:redhat:rhel_els:7
Red Hat Red Hat Enterprise Linux 8 8 - - cpe:/a:redhat:enterprise_linux:8::appstream
Red Hat Red Hat Enterprise Linux 8.2 Advanced Update Support 8.2 - - cpe:/a:redhat:rhel_aus:8.2::appstream
Red Hat Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 8.4 - - cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
Red Hat Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On 8.4 - - cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
Red Hat Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support 8.6 - - cpe:/a:redhat:rhel_aus:8.6::appstream
Red Hat Red Hat Enterprise Linux 8.6 Telecommunications Update Service 8.6 - - cpe:/a:redhat:rhel_aus:8.6::appstream
Red Hat Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions 8.6 - - cpe:/a:redhat:rhel_aus:8.6::appstream
Red Hat Red Hat Enterprise Linux 8.8 Telecommunications Update Service 8.8 - - cpe:/a:redhat:rhel_tus:8.8::appstream
Red Hat Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions 8.8 - - cpe:/a:redhat:rhel_tus:8.8::appstream
Red Hat Red Hat Enterprise Linux 9 9 - - cpe:/a:redhat:enterprise_linux:9::appstream
Red Hat Red Hat Enterprise Linux 6 - - - cpe:/o:redhat:enterprise_linux:6
Red Hat Red Hat Enterprise Linux 7 - - - cpe:/o:redhat:enterprise_linux:7
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
RHSA-2025:17651 vendor-advisory
cve.org
访问
RHSA-2025:17675 vendor-advisory
cve.org
访问
RHSA-2025:17710 vendor-advisory
cve.org
访问
RHSA-2025:17738 vendor-advisory
cve.org
访问
RHSA-2025:17739 vendor-advisory
cve.org
访问
RHSA-2025:17740 vendor-advisory
cve.org
访问
RHSA-2025:19113 vendor-advisory
cve.org
访问
RHSA-2025:19156 vendor-advisory
cve.org
访问
RHSA-2025:19276 vendor-advisory
cve.org
访问
RHSA-2025:19906 vendor-advisory
cve.org
访问
RHSA-2025:19947 vendor-advisory
cve.org
访问
无标题 vdb-entry
cve.org
访问
RHBZ#2392784 issue-tracking
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
CVSS评分详情
3.1 (cna)
HIGH
8.8
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2025-09-23 16:26:22
修改时间:
2025-11-10 02:22:47
创建时间:
2025-11-11 15:40:55
更新时间:
2025-11-11 16:00:13
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-9900 2025-11-11 15:23:38 2025-11-11 07:40:55
NVD nvd_CVE-2025-9900 2025-11-11 15:01:03 2025-11-11 07:48:41
CNNVD cnnvd_CNNVD-202509-3630 2025-11-11 15:12:58 2025-11-11 08:00:13
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:13
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202509-3630; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202509-3630
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:41
affected_products_count: 18 → 14; references_count: 17 → 19; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 18 -> 14
  • references_count: 17 -> 19
  • data_sources: ['cve'] -> ['cve', 'nvd']