CVE-2006-2656

Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:11

Type Values Removed Values Added
References () http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html - () http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html -
References () http://marc.info/?l=vuln-dev&m=114857412916909&w=2 - () http://marc.info/?l=vuln-dev&m=114857412916909&w=2 -
References () http://secunia.com/advisories/20501 - Vendor Advisory () http://secunia.com/advisories/20501 - Vendor Advisory
References () http://secunia.com/advisories/20520 - Vendor Advisory () http://secunia.com/advisories/20520 - Vendor Advisory
References () http://secunia.com/advisories/20766 - Vendor Advisory () http://secunia.com/advisories/20766 - Vendor Advisory
References () http://secunia.com/advisories/21002 - Vendor Advisory () http://secunia.com/advisories/21002 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200607-03.xml - () http://security.gentoo.org/glsa/glsa-200607-03.xml -
References () http://www.debian.org/security/2006/dsa-1091 - () http://www.debian.org/security/2006/dsa-1091 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:095 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:095 -
References () https://usn.ubuntu.com/289-1/ - () https://usn.ubuntu.com/289-1/ -
References () https://www.redhat.com/archives/fedora-package-announce/2006-May/msg00127.html - Patch () https://www.redhat.com/archives/fedora-package-announce/2006-May/msg00127.html - Patch

07 Nov 2023, 01:58

Type Values Removed Values Added
Summary Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE. Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.

Information

Published : 2006-05-30 18:02

Updated : 2024-11-21 00:11


NVD link : CVE-2006-2656

Mitre link : CVE-2006-2656

CVE.ORG link : CVE-2006-2656


JSON object : View

Products Affected

libtiff

  • libtiff
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer