Vulnerability Name: | CVE-2006-2656 (CCN-31278) | ||||||||||||||||||||||||
Assigned: | 2006-05-25 | ||||||||||||||||||||||||
Published: | 2006-05-25 | ||||||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||||||
Summary: | Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. Note: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE. | ||||||||||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2006-2656 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Vuln-Dev Mailing List, 2006-05-24 5:30:40 tiffsplit (libtiff <= 3.8.2) bss & stack buffer overflow... Source: CCN Type: RHSA-2006-0603 libtiff security update Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: DEBIAN Type: DSA-1091 tiff -- buffer overflows Source: CCN Type: GLSA-200607-03 libTIFF: Multiple buffer overflows Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: OSVDB ID: 26030 LibTIFF tiffsplit Filename Processing Overflow Source: CCN Type: USN-289-1 tiff vulnerabilities Source: XF Type: UNKNOWN libtiff-tiffsplit-bo(31278) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Fedora Update Notification FEDORA-2006-591 Fedora Core 4 Update: libtiff-3.7.1-6.fc4.2 Source: secalert@redhat.com Type: Patch secalert@redhat.com Source: SUSE Type: SUSE-SR:2006:014 SUSE Security Summary Report | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |