CVE-2025-57812

LOW
中文标题:
(暂无数据)
英文标题:
[BIGSLEEP-434612419] CUPS-Filters has heap-buffer-overflow write in `cfImageLut()`
CVSS分数: 3.7
发布时间: 2025-11-12 18:46:52
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v3
漏洞描述
中文描述:

(暂无数据)

英文描述:

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. In CUPS-Filters versions up to and including 1.28.17 and libscupsfilters versions 2.0.0 through 2.1.1, CUPS-Filters's `imagetoraster` filter has an out of bounds read/write vulnerability in the processing of TIFF image files. While the pixel buffer is allocated with the number of pixels times a pre-calculated bytes-per-pixel value, the function which processes these pixels is called with a size of the number of pixels times 3. When suitable inputs are passed, the bytes-per-pixel value can be set to 1 and bytes outside of the buffer bounds get processed. In order to trigger the bug, an attacker must issue a print job with a crafted TIFF file, and pass appropriate print job options to control the bytes-per-pixel value of the output format. They must choose a printer configuration under which the `imagetoraster` filter or its C-function equivalent `cfFilterImageToRaster()` gets invoked. The vulnerability exists in both CUPS-Filters 1.x and the successor library libcupsfilters (CUPS-Filters 2.x). In CUPS-Filters 2.x, the vulnerable function is `_cfImageReadTIFF() in libcupsfilters`. When this function is invoked as part of `cfFilterImageToRaster()`, the caller passes a look-up-table during whose processing the out of bounds memory access happens. In CUPS-Filters 1.x, the equivalent functions are all found in the cups-filters repository, which is not split into subprojects yet, and the vulnerable code is in `_cupsImageReadTIFF()`, which is called through `cupsImageOpen()` from the `imagetoraster` tool. A patch is available in commit b69dfacec7f176281782e2f7ac44f04bf9633cfa.

CWE类型:
CWE-787 CWE-125
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
OpenPrinting libcupsfilters cups-filters <= 1.28.17 - - cpe:2.3:a:openprinting:libcupsfilters:cups-filters_<=_1.28.17:*:*:*:*:*:*:*
OpenPrinting libcupsfilters libcupsfilters >= 2.0.0, < 2.1.1 - - cpe:2.3:a:openprinting:libcupsfilters:libcupsfilters_>=_2.0.0,_<_2.1.1:*:*:*:*:*:*:*
openprinting cups-filters * - - cpe:2.3:a:openprinting:cups-filters:*:*:*:*:*:*:*:*
openprinting libcupsfilters * - - cpe:2.3:a:openprinting:libcupsfilters:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4 x_refsource_CONFIRM
cve.org
访问
https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa x_refsource_MISC
cve.org
访问
https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34 x_refsource_MISC
cve.org
访问
https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613 x_refsource_MISC
cve.org
访问
https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32 x_refsource_MISC
cve.org
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
CVSS评分详情
3.1 (cna)
LOW
3.7
CVSS向量: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
机密性
LOW
完整性
LOW
可用性
NONE
时间信息
发布时间:
2025-11-12 18:46:52
修改时间:
2025-11-12 21:04:17
创建时间:
2026-01-12 02:12:05
更新时间:
2026-01-21 06:00:14
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-57812 2025-11-15 03:17:48 2026-01-12 02:12:05
NVD nvd_CVE-2025-57812 2025-11-15 03:18:45 2026-01-12 02:27:54
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v3 NVD
2026-01-21 06:00:14
affected_products_count: 2 → 4
查看详细变更
  • affected_products_count: 2 -> 4
v2 NVD
2026-01-12 02:27:54
references_count: 5 → 6; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • references_count: 5 -> 6
  • data_sources: ['cve'] -> ['cve', 'nvd']