Unrated severityNVD Advisory· Published May 30, 2006· Updated Apr 16, 2026
CVE-2006-2656
CVE-2006-2656
Description
Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.
Affected products
15cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*+ 14 more
- cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*range: <=3.8.2
- cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- www.redhat.com/archives/fedora-package-announce/2006-May/msg00127.htmlnvdPatch
- secunia.com/advisories/20501nvdVendor Advisory
- secunia.com/advisories/20520nvdVendor Advisory
- secunia.com/advisories/20766nvdVendor Advisory
- secunia.com/advisories/21002nvdVendor Advisory
- lists.suse.com/archive/suse-security-announce/2006-Jun/0008.htmlnvd
- marc.infonvd
- security.gentoo.org/glsa/glsa-200607-03.xmlnvd
- www.debian.org/security/2006/dsa-1091nvd
- www.mandriva.com/security/advisoriesnvd
- usn.ubuntu.com/289-1/nvd
News mentions
0No linked articles in our index yet.