Description
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file.

By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
Published: 2025-09-23
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in libtiff allows a write-what-where condition when a TIFF file contains an unusually large image height. The library writes attacker-controlled color data to an arbitrary memory location, which can lead to a crash (denial of service) or execution of arbitrary code with the permissions of the user that runs the process. This is a classic memory corruption bug that can be exploited when the application accepts TIFF input from an untrusted source. It is inferred from the description that the attacker supplies a specially crafted TIFF file to trigger the vulnerability.

Affected Systems

Affected products are numerous Red Hat offerings, including Red Hat AI Inference Server 3.2, Red Hat Discovery 2 and all supported releases of Red Hat Enterprise Linux from version 6 through 10, Enterprise Linux 8 and 9 with their advanced and extended update support branches, as well as Red Hat Hardened images. The affected versions are those listed in the vendor’s errata (RHSA‑2025‑17651, RHSA‑2025‑17675, RHSA‑2025‑17710, …​).

Risk and Exploitability

The CVSS score of 8.8 marks this flaw as high severity, but the EPSS score of less than 1% indicates that exploitation is considered unlikely at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to supply a crafted TIFF file to the vulnerable application; if the application runs under elevated privileges, the corrupt memory could give the attacker code execution within that privilege level. The lack of a published exploit and the low EPSS suggest that the risk is moderate until a zero‑day payload is discovered.

Generated by OpenCVE AI on April 20, 2026 at 19:29 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.


OpenCVE Recommended Actions

  • Apply all applicable Red Hat errata updates for the affected products (e.g., RHSA‑2025‑17651, RHSA‑2025‑17675, RHSA‑2025‑17710, and subsequent updates).
  • Verify that any services or applications processing TIFF files are linked against the updated libtiff library and run with the least privilege required.
  • Monitor system logs for crashes, segmentation faults, or other signs of memory corruption that may indicate exploitation attempts.
  • No temporary workaround is available; continue using vendor patches.

Generated by OpenCVE AI on April 20, 2026 at 19:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4315-1 tiff security update
Debian DSA Debian DSA DSA-6023-1 tiff security update
EUVD EUVD EUVD-2025-30917 A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
Ubuntu USN Ubuntu USN USN-7783-1 LibTIFF vulnerabilities
References
Link Providers
http://www.openwall.com/lists/oss-security/2025/09/26/3 cve-icon
https://access.redhat.com/errata/RHSA-2025:17651 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:17675 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:17710 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:17738 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:17739 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:17740 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:19113 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:19156 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:19276 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:19906 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:19947 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:20956 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:20998 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:21060 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:21061 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:21062 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:21407 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:21506 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:21507 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:21508 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:21994 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:23078 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:23079 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:23080 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2026:0001 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2026:0076 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2026:0077 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2026:0078 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2026:3461 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2026:3462 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2026:7504 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2025-9900 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=2392784 cve-icon cve-icon
https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file cve-icon cve-icon cve-icon cve-icon
https://gitlab.com/libtiff/libtiff/-/issues/704 cve-icon cve-icon
https://gitlab.com/libtiff/libtiff/-/merge_requests/732 cve-icon cve-icon
https://libtiff.gitlab.io/libtiff/releases/v4.7.1.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2025/09/msg00031.html cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2025-9900 cve-icon
https://www.cve.org/CVERecord?id=CVE-2025-9900 cve-icon
History

Mon, 20 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
References

Mon, 13 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat hummingbird
CPEs cpe:/a:redhat:hummingbird:1
Vendors & Products Redhat hummingbird

Fri, 27 Feb 2026 15:45:00 +0000


Fri, 27 Feb 2026 06:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 06 Jan 2026 07:00:00 +0000


Mon, 05 Jan 2026 18:00:00 +0000

Type Values Removed Values Added
References

Mon, 05 Jan 2026 04:00:00 +0000

Type Values Removed Values Added
References

Wed, 10 Dec 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat ai Inference Server
CPEs cpe:/a:redhat:ai_inference_server:3.2::el9
Vendors & Products Redhat ai Inference Server
References

Mon, 24 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat discovery
CPEs cpe:/a:redhat:discovery:2::el9
Vendors & Products Redhat discovery
References

Mon, 17 Nov 2025 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhel_e4s:9.0::appstream
References

Mon, 17 Nov 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Eus
CPEs cpe:/a:redhat:rhel_e4s:9.2::appstream
cpe:/a:redhat:rhel_eus:9.4::appstream
cpe:/a:redhat:rhel_eus:9.4::crb
Vendors & Products Redhat rhel Eus
References

Mon, 17 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:7
References

Wed, 12 Nov 2025 08:45:00 +0000

Type Values Removed Values Added
References

Wed, 12 Nov 2025 03:00:00 +0000


Tue, 11 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10.1
References

Tue, 11 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
References

Mon, 10 Nov 2025 02:30:00 +0000

Type Values Removed Values Added
References

Fri, 07 Nov 2025 21:45:00 +0000


Thu, 06 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:8
References

Tue, 04 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Mon, 03 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Thu, 30 Oct 2025 01:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:8::crb
References

Tue, 28 Oct 2025 11:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:10.0
References

Tue, 28 Oct 2025 00:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:9 cpe:/a:redhat:enterprise_linux:9::appstream
cpe:/a:redhat:enterprise_linux:9::crb
References

Mon, 13 Oct 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel E4s
Redhat rhel Tus
CPEs cpe:/a:redhat:rhel_aus:8.2::appstream
cpe:/a:redhat:rhel_aus:8.6::appstream
cpe:/a:redhat:rhel_e4s:8.6::appstream
cpe:/a:redhat:rhel_e4s:8.8::appstream
cpe:/a:redhat:rhel_tus:8.6::appstream
cpe:/a:redhat:rhel_tus:8.8::appstream
Vendors & Products Redhat rhel E4s
Redhat rhel Tus
References

Thu, 09 Oct 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Els
CPEs cpe:/o:redhat:rhel_els:7
Vendors & Products Redhat rhel Els
References

Thu, 09 Oct 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Aus
Redhat rhel Eus Long Life
CPEs cpe:/a:redhat:enterprise_linux:8::appstream
cpe:/a:redhat:rhel_aus:8.4::appstream
cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
Vendors & Products Redhat rhel Aus
Redhat rhel Eus Long Life
References

Wed, 08 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:rhivos:1
Vendors & Products Redhat rhivos

Wed, 01 Oct 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhivos
CPEs cpe:/o:redhat:rhivos:1
Vendors & Products Redhat rhivos

Tue, 23 Sep 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 23 Sep 2025 16:45:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
Title libtiff: Libtiff Write-What-Where Libtiff: libtiff write-what-where
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References

Tue, 23 Sep 2025 00:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title libtiff: Libtiff Write-What-Where
Weaknesses CWE-123
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

threat_severity

Important


Subscriptions

Redhat Ai Inference Server Discovery Enterprise Linux Hummingbird Rhel Aus Rhel E4s Rhel Els Rhel Eus Rhel Eus Long Life Rhel Tus
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-29T03:55:29.461Z

Reserved: 2025-09-03T03:01:04.778Z

Link: CVE-2025-9900

cve-icon Vulnrichment

Updated: 2025-11-04T21:15:25.287Z

cve-icon NVD

Status : Deferred

Published: 2025-09-23T17:15:38.357

Modified: 2026-04-20T22:16:22.580

Link: CVE-2025-9900

cve-icon Redhat

Severity : Important

Publid Date: 2025-09-22T14:29:35Z

Links: CVE-2025-9900 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T19:30:06Z

Weaknesses