Куда я попал?
CVE-2025-9900
PUBLISHED
13.10.2025
CNA: redhat
Libtiff: libtiff write-what-where
Обновлено:
13.10.2025
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file.
By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
CWE
| Идентификатор | Описание |
|---|---|
| CWE-123 | CWE-123: Write-what-where Condition |
НКЦКИ уязвимости
Бюллетени НКЦКИ - уязвимости ПО
| Идентификатор | Дата бюллетеня | Описание |
|---|---|---|
| VULN:20251009-11 | 09.10.2025 | Выполнение произвольного кода в Libtiff |
CVSS
| Оценка | Severity | Версия | Базовый вектор |
|---|---|---|---|
| 8.8 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Доп. Информация
Product Status
| Red Hat Enterprise Linux 7 Extended Lifecycle Support | |||||
|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 Extended Lifecycle Support | ||||
| Vendor: | Red Hat | ||||
| Default status: | affected | ||||
| Версии: |
|
||||
| СPE: |
|
||||
| Red Hat Enterprise Linux 8 | |||||
|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | ||||
| Vendor: | Red Hat | ||||
| Default status: | affected | ||||
| Версии: |
|
||||
| СPE: |
|
||||
| Red Hat Enterprise Linux 8.2 Advanced Update Support | |||||
|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8.2 Advanced Update Support | ||||
| Vendor: | Red Hat | ||||
| Default status: | affected | ||||
| Версии: |
|
||||
| СPE: |
|
||||
| Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | |||||
|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | ||||
| Vendor: | Red Hat | ||||
| Default status: | affected | ||||
| Версии: |
|
||||
| СPE: |
|
||||
| Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On | |||||
|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On | ||||
| Vendor: | Red Hat | ||||
| Default status: | affected | ||||
| Версии: |
|
||||
| СPE: |
|
||||
| Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support | |||||
|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support | ||||
| Vendor: | Red Hat | ||||
| Default status: | affected | ||||
| Версии: |
|
||||
| СPE: |
|
||||
| Red Hat Enterprise Linux 8.6 Telecommunications Update Service | |||||
|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8.6 Telecommunications Update Service | ||||
| Vendor: | Red Hat | ||||
| Default status: | affected | ||||
| Версии: |
|
||||
| СPE: |
|
||||
| Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions | |||||
|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions | ||||
| Vendor: | Red Hat | ||||
| Default status: | affected | ||||
| Версии: |
|
||||
| СPE: |
|
||||
| Red Hat Enterprise Linux 8.8 Telecommunications Update Service | |||||
|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8.8 Telecommunications Update Service | ||||
| Vendor: | Red Hat | ||||
| Default status: | affected | ||||
| Версии: |
|
||||
| СPE: |
|
||||
| Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions | |||||
|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions | ||||
| Vendor: | Red Hat | ||||
| Default status: | affected | ||||
| Версии: |
|
||||
| СPE: |
|
||||
| Red Hat Enterprise Linux 10 | |
|---|---|
| Product: | Red Hat Enterprise Linux 10 |
| Vendor: | Red Hat |
| Default status: | affected |
| СPE: |
|
| Red Hat Enterprise Linux 6 | |
|---|---|
| Product: | Red Hat Enterprise Linux 6 |
| Vendor: | Red Hat |
| Default status: | unknown |
| СPE: |
|
| Red Hat Enterprise Linux 7 | |
|---|---|
| Product: | Red Hat Enterprise Linux 7 |
| Vendor: | Red Hat |
| Default status: | affected |
| СPE: |
|
| Red Hat Enterprise Linux 8 | |
|---|---|
| Product: | Red Hat Enterprise Linux 8 |
| Vendor: | Red Hat |
| Default status: | affected |
| СPE: |
|
| Red Hat Enterprise Linux 8 | |
|---|---|
| Product: | Red Hat Enterprise Linux 8 |
| Vendor: | Red Hat |
| Default status: | affected |
| СPE: |
|
| Red Hat Enterprise Linux 9 | |
|---|---|
| Product: | Red Hat Enterprise Linux 9 |
| Vendor: | Red Hat |
| Default status: | affected |
| СPE: |
|
Ссылки
CISA ADP Vulnrichment
Обновлено:
24.09.2025
Этот блок содержит дополнительную информацию, предоставленную программой CVE для этой уязвимости.
SSVC
| Exploitation | Automatable | Technical Impact | Версия | Дата доступа |
|---|---|---|---|---|
| none | no | total | 2.0.3 | 23.09.2025 |
Ссылки
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.