{"id":"CVE-2025-9900","details":"A flaw was found in Libtiff. This vulnerability is a \"write-what-where\" condition, triggered when the library processes a specially crafted TIFF image file.\n\nBy providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.","modified":"2026-04-16T04:40:30.040331748Z","published":"2025-09-23T17:15:38.357Z","related":["ALSA-2025:17675","ALSA-2025:19113","ALSA-2025:19156","ALSA-2025:19276","ALSA-2025:19906","ALSA-2025:20956","ALSA-2025:20998","SUSE-SU-2025:20971-1","SUSE-SU-2025:21009-1","SUSE-SU-2025:21032-1","SUSE-SU-2025:21037-1","SUSE-SU-2025:3941-1","SUSE-SU-2025:3957-1","SUSE-SU-2025:3961-1","openSUSE-SU-2025:15635-1","openSUSE-SU-2025:20049-1"],"references":[{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2025-9900"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2025/09/26/3"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/09/msg00031.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:19276"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:19906"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:23078"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:23080"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:17740"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:21506"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:21994"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:17710"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:20956"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:21508"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:23079"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:0076"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:0077"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:0078"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:3462"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:17675"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:17739"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:19947"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:20998"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:21061"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:21507"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:0001"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:3461"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:17738"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:21062"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:19113"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:21407"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:17651"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:19156"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:21060"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2392784"},{"type":"REPORT","url":"https://gitlab.com/libtiff/libtiff/-/issues/704"},{"type":"FIX","url":"https://gitlab.com/libtiff/libtiff/-/merge_requests/732"},{"type":"PACKAGE","url":"https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file"},{"type":"PACKAGE","url":"https://libtiff.gitlab.io/libtiff/releases/v4.7.1.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-9900.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}