CVE-2025-61144
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to execute malicious code on a system by exploiting a stack overflow in the libtiff library when processing specially crafted TIFF images. To be successful, the attacker needs to convince the victim to open a manipulated TIFF file, which could lead to unauthorized access or control over the affected system.
Technical Description
libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 23, 2026
about 1 month ago
Last Modified
Feb 25, 2026
about 1 month ago
Vendor
libtiff
Product
libtiff
Related Vulnerabilities
This vulnerability allows an attacker to potentially crash the libtiff software or execute arbitrary code by exploiting a flaw in the tiffcrop tool, which can happen if the attacker can manipulate the input files processed by this tool. To take advantage of this issue, the attacker needs to provide specially crafted TIFF files to the application using libtiff, which could be done through file uploads or other means of file handling.
This vulnerability allows an attacker to crash applications that use the libtiff library by exploiting a flaw in how the library handles certain image files, leading to a program failure. To take advantage of this, the attacker must be able to provide a specially crafted TIFF file to the application.
An attacker can exploit a flaw in libtiff to crash applications by sending a specially crafted TIFF file, which can lead to a denial of service. This vulnerability occurs when the TIFFReadRGBATileExt() function processes the malicious file, causing the program to fail unexpectedly.
This vulnerability allows an attacker to crash applications that use the libtiff library by sending them a specially crafted TIFF file, which can be as small as 379 KB. To exploit this flaw, the attacker needs to get the target to open the malicious TIFF file, leading to a denial of service.
This vulnerability allows an attacker to potentially run malicious code on a system or crash it by tricking the libtiff tool into processing a specially crafted image file with a manipulated BitsPerSample value. The attacker needs to have access to a vulnerable version of the libtiff tool to exploit this weakness.