CVE-2006-2656

Priority
Untriaged
Description
Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and
earlier might might allow attackers to execute arbitrary code via a long
filename. NOTE: tiffsplit is not setuid. If there is not a common
scenario under which tiffsplit is called with attacker-controlled command
line arguments, then perhaps this issue should not be included in CVE.
References
Package
Source: tiff (LP Ubuntu Debian)
Upstream:released (3.8.2-3)
Ubuntu 8.04 LTS (Hardy Heron):released (3.8.2-6)
Ubuntu 10.04 LTS (Lucid Lynx):released (3.8.2-6)
Package
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):not-affected (has tiff 3.8.2-7)
Ubuntu 10.04 LTS (Lucid Lynx):not-affected
More Information

Valid XHTML 1.0 Strict

Updated: 2012-06-01 15:17:09 UTC (commit 5347)