Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65803: n/a

0
Medium
VulnerabilityCVE-2025-65803cvecve-2025-65803
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An integer overflow in the psdParser::ReadImageData function of FreeImage v3.18.0 and before allows attackers to cause a Denial of Service (DoS) via supplying a crafted PSD file.

AI-Powered Analysis

AILast updated: 12/17/2025, 16:13:04 UTC

Technical Analysis

CVE-2025-65803 is an integer overflow vulnerability identified in the psdParser::ReadImageData function within FreeImage version 3.18.0 and earlier. FreeImage is an open-source library widely used for image processing and supports multiple image formats, including Adobe Photoshop's PSD files. The vulnerability arises when the function incorrectly handles certain size or length fields in a crafted PSD file, causing an integer overflow during the calculation of buffer sizes or offsets. This overflow can lead to memory corruption or buffer overflows, which in this case result in a denial of service (DoS) by crashing or hanging the application processing the file. The vulnerability does not allow code execution or data manipulation but disrupts availability. Exploitation requires an attacker to supply a malicious PSD file and trick a user or system into opening or processing it, thus requiring user interaction but no privileges. The CVSS v3.1 base score is 6.5, reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and impact limited to availability. No patches or fixes have been released yet, and no known exploits are reported in the wild. The vulnerability is classified under CWE-190 (Integer Overflow or Wraparound).

Potential Impact

For European organizations, this vulnerability primarily threatens availability of systems that utilize FreeImage for processing PSD files. This includes graphic design firms, media companies, software developers, and any enterprise applications that integrate FreeImage for image manipulation. A successful exploit can cause application crashes or hangs, leading to service disruptions, workflow interruptions, and potential productivity losses. While it does not compromise data confidentiality or integrity, repeated or targeted DoS attacks could degrade service reliability and impact business operations. Organizations relying on automated image processing pipelines or web services that accept PSD uploads are particularly at risk. The lack of known exploits reduces immediate risk, but the medium severity score indicates a need for proactive mitigation. The impact is more pronounced in environments where FreeImage is embedded in critical or high-availability systems.

Mitigation Recommendations

1. Immediately audit and inventory all software and systems using FreeImage, especially versions 3.18.0 and earlier. 2. Avoid opening or processing PSD files from untrusted or unknown sources until a patch is available. 3. Implement sandboxing or containerization for image processing tasks to isolate potential crashes and prevent system-wide impact. 4. Monitor FreeImage project communications and security advisories closely for forthcoming patches or updates addressing this vulnerability. 5. Employ input validation and file integrity checks to detect malformed or suspicious PSD files before processing. 6. Consider alternative image processing libraries or updated versions that do not contain this vulnerability if feasible. 7. Educate users about the risks of opening unsolicited or suspicious PSD files. 8. Incorporate application-level timeouts and error handling to gracefully recover from crashes caused by malformed images.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939921d86adcdec9b0f4b88

Added to database: 12/10/2025, 3:30:37 PM

Last enriched: 12/17/2025, 4:13:04 PM

Last updated: 2/7/2026, 2:29:23 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats