CVE-2025-57812
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openprinting | cups-filters | 1.28.17 |
| openprinting | cups-filters | 2.1.1 |
| openprinting | cups-filters | 2.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds read/write issue in the imagetoraster filter of CUPS-Filters and libcupsfilters when processing TIFF image files. Specifically, the pixel buffer is allocated based on a calculated bytes-per-pixel value, but the processing function uses a fixed multiplier of 3, which can cause memory outside the allocated buffer to be accessed if the bytes-per-pixel is set to 1. An attacker can exploit this by submitting a print job with a specially crafted TIFF file and specific print job options that trigger this condition.
How can this vulnerability impact me? :
The vulnerability can lead to out-of-bounds memory access during the processing of print jobs with crafted TIFF files. This could potentially cause data corruption or leakage of sensitive information from memory, impacting the integrity and confidentiality of the system handling the print jobs.
What immediate steps should I take to mitigate this vulnerability?
Apply the available patch referenced by commit b69dfacec7f176281782e2f7ac44f04bf9633cfa to update the vulnerable functions in CUPS-Filters or libcupsfilters. Avoid processing print jobs with untrusted or crafted TIFF files that could trigger the vulnerability until patched.