CVE-2025-9165

A flaw has been found in LibTIFF 4.7.0. This affects the function _TIFFmallocExt/_TIFFCheckRealloc/TIFFHashSetNew/InitCCITTFax3 of the file tools/tiffcmp.c of the component tiffcmp. Executing manipulation can lead to memory leak. The attack is restricted to local execution. This attack is characterized by high complexity. It is indicated that the exploitability is difficult. The exploit has been published and may be used. There is ongoing doubt regarding the real existence of this vulnerability. This patch is called ed141286a37f6e5ddafb5069347ff5d587e7a4e0. It is best practice to apply a patch to resolve this issue. A researcher disputes the security impact of this issue, because "this is a memory leak on a command line tool that is about to exit anyway". In the reply the project maintainer declares this issue as "a simple 'bug' when leaving the command line tool and (...) not a security issue at all".
Configurations

Configuration 1 (hide)

cpe:2.3:a:libtiff:libtiff:4.7.0:*:*:*:*:*:*:*

History

01 Oct 2025, 16:15

Type Values Removed Values Added
Summary (en) A flaw has been found in LibTIFF 4.7.0. This affects the function _TIFFmallocExt/_TIFFCheckRealloc/TIFFHashSetNew/InitCCITTFax3 of the file tools/tiffcmp.c of the component tiffcmp. Executing manipulation can lead to memory leak. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ed141286a37f6e5ddafb5069347ff5d587e7a4e0. It is best practice to apply a patch to resolve this issue. (en) A flaw has been found in LibTIFF 4.7.0. This affects the function _TIFFmallocExt/_TIFFCheckRealloc/TIFFHashSetNew/InitCCITTFax3 of the file tools/tiffcmp.c of the component tiffcmp. Executing manipulation can lead to memory leak. The attack is restricted to local execution. This attack is characterized by high complexity. It is indicated that the exploitability is difficult. The exploit has been published and may be used. There is ongoing doubt regarding the real existence of this vulnerability. This patch is called ed141286a37f6e5ddafb5069347ff5d587e7a4e0. It is best practice to apply a patch to resolve this issue. A researcher disputes the security impact of this issue, because "this is a memory leak on a command line tool that is about to exit anyway". In the reply the project maintainer declares this issue as "a simple 'bug' when leaving the command line tool and (...) not a security issue at all".
References () https://gitlab.com/libtiff/libtiff/-/issues/728#note_2709263214 - Issue Tracking, Exploit, Vendor Advisory () https://gitlab.com/libtiff/libtiff/-/issues/728#note_2709263214 - Exploit, Issue Tracking, Vendor Advisory
CVSS v2 : 1.7
v3 : 3.3
v2 : 1.0
v3 : 2.5

11 Sep 2025, 16:06

Type Values Removed Values Added
CPE cpe:2.3:a:libtiff:libtiff:4.7.0:*:*:*:*:*:*:*
References () http://www.libtiff.org/ - () http://www.libtiff.org/ - Product
References () https://drive.google.com/file/d/1FWhmkzksH8-qU0ZM6seBzGNB3aPnX3G8/view?usp=sharing - () https://drive.google.com/file/d/1FWhmkzksH8-qU0ZM6seBzGNB3aPnX3G8/view?usp=sharing - Exploit
References () https://gitlab.com/libtiff/libtiff/-/commit/ed141286a37f6e5ddafb5069347ff5d587e7a4e0 - () https://gitlab.com/libtiff/libtiff/-/commit/ed141286a37f6e5ddafb5069347ff5d587e7a4e0 - Patch
References () https://gitlab.com/libtiff/libtiff/-/issues/728 - () https://gitlab.com/libtiff/libtiff/-/issues/728 - Exploit, Issue Tracking, Vendor Advisory
References () https://gitlab.com/libtiff/libtiff/-/merge_requests/747 - () https://gitlab.com/libtiff/libtiff/-/merge_requests/747 - Issue Tracking, Patch, Vendor Advisory
References () https://vuldb.com/?ctiid.320543 - () https://vuldb.com/?ctiid.320543 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.320543 - () https://vuldb.com/?id.320543 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.630506 - () https://vuldb.com/?submit.630506 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.630507 - () https://vuldb.com/?submit.630507 - Third Party Advisory, VDB Entry
References () https://gitlab.com/libtiff/libtiff/-/issues/728#note_2709263214 - () https://gitlab.com/libtiff/libtiff/-/issues/728#note_2709263214 - Issue Tracking, Exploit, Vendor Advisory
First Time Libtiff
Libtiff libtiff

26 Aug 2025, 16:15

Type Values Removed Values Added
References
  • () https://gitlab.com/libtiff/libtiff/-/issues/728#note_2709263214 -

20 Aug 2025, 14:40

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una falla en LibTIFF 4.7.0. Esta afecta a la función _TIFFmallocExt/_TIFFCheckRealloc/TIFFHashSetNew/InitCCITTFax3 del archivo tools/tiffcmp.c del componente tiffcmp. La manipulación puede provocar una fuga de memoria. El ataque se limita a la ejecución local. Se ha hecho público el exploit y puede que sea utilizado. Este parche se llama ed141286a37f6e5ddafb5069347ff5d587e7a4e0. Se recomienda aplicar un parche para resolver este problema.

19 Aug 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-19 20:15

Updated : 2025-10-01 16:15


NVD link : CVE-2025-9165

Mitre link : CVE-2025-9165

CVE.ORG link : CVE-2025-9165


JSON object : View

Products Affected

libtiff

  • libtiff
CWE
CWE-401

Missing Release of Memory after Effective Lifetime

CWE-404

Improper Resource Shutdown or Release