Out-of-Bounds Affecting tiff package, versions <4.7.0-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-TIFF-11779720
  • published12 Aug 2025
  • disclosed11 Aug 2025

Introduced: 11 Aug 2025

NewCVE-2025-8851  (opens in a new tab)
CWE-119  (opens in a new tab)
CWE-121  (opens in a new tab)

How to fix?

Upgrade Debian:unstable tiff to version 4.7.0-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream tiff package and not the tiff package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

A vulnerability was determined in LibTIFF up to 4.5.1. Affected by this issue is the function readSeparateStripsetoBuffer of the file tools/tiffcrop.c of the component tiffcrop. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The patch is identified as 8a7a48d7a645992ca83062b3a1873c951661e2b3. It is recommended to apply a patch to fix this issue.

CVSS Base Scores

version 3.1