Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2006-2656
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-30 May, 2006 | 18:02
Updated At-03 Apr, 2025 | 01:03

Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

LibTIFF
libtiff
>>libtiff>>Versions up to 3.8.2(inclusive)
cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.4
cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.5.1
cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.5.2
cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.5.3
cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.5.4
cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.5.5
cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.5.6
cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.5.7
cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.6.0
cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.6.1
cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.7.0
cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.7.1
cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.8.0
cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:*
LibTIFF
libtiff
>>libtiff>>3.8.1
cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2008-08-12T00:00:00

This issue was addressed in libtiff packages as shipped in Red Hat Enterprise Linux 2.1, 3, and 4 via: https://rhn.redhat.com/errata/RHSA-2006-0603.html Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References
HyperlinkSourceResource
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.htmlsecalert@redhat.com
N/A
http://marc.info/?l=vuln-dev&m=114857412916909&w=2secalert@redhat.com
N/A
http://secunia.com/advisories/20501secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/20520secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/20766secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21002secalert@redhat.com
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200607-03.xmlsecalert@redhat.com
N/A
http://www.debian.org/security/2006/dsa-1091secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:095secalert@redhat.com
N/A
https://usn.ubuntu.com/289-1/secalert@redhat.com
N/A
https://www.redhat.com/archives/fedora-package-announce/2006-May/msg00127.htmlsecalert@redhat.com
Patch
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=vuln-dev&m=114857412916909&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/20501af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20520af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20766af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21002af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200607-03.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2006/dsa-1091af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDKSA-2006:095af854a3a-2127-422b-91ae-364da2661108
N/A
https://usn.ubuntu.com/289-1/af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.redhat.com/archives/fedora-package-announce/2006-May/msg00127.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Change History
0Changes found

Details not found