Upstream information

CVE-2006-2656 at MITRE

Description

Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 179051 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Micro 6.0
  • libtiff6 >= 4.6.0-3.3
Patchnames:
SUSE Linux Enterprise Micro 6.0 GA libtiff6-4.6.0-3.3
SUSE Linux Enterprise Micro 6.1
  • libtiff6 >= 4.6.0-slfo.1.1_1.3
Patchnames:
SUSE Linux Enterprise Micro 6.1 GA libtiff6-4.6.0-slfo.1.1_1.3
openSUSE Tumbleweed
  • libtiff-devel >= 4.3.0-1.3
  • libtiff-devel-32bit >= 4.3.0-1.3
  • libtiff5 >= 4.3.0-1.3
  • libtiff5-32bit >= 4.3.0-1.3
  • tiff >= 4.3.0-1.3
Patchnames:
openSUSE-Tumbleweed-2024-11461


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 02:57:34 2013
CVE page last modified: Sat Nov 23 13:11:10 2024