7.5
CVSSv2

CVE-2006-2656

Published: 30/05/2006 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and previous versions might might allow malicious users to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.

Vulnerable Product Search on Vulmon Subscribe to Product

libtiff libtiff 3.6.1

libtiff libtiff 3.8.0

libtiff libtiff 3.8.1

libtiff libtiff 3.4

libtiff libtiff 3.5.7

libtiff libtiff 3.7.0

libtiff libtiff 3.6.0

libtiff libtiff 3.5.3

libtiff libtiff 3.7.1

libtiff libtiff 3.5.4

libtiff libtiff 3.5.2

libtiff libtiff 3.5.5

libtiff libtiff 3.5.1

libtiff libtiff 3.5.6

libtiff libtiff

Vendor Advisories

Debian Bug report logs - #369819 libtiff-tools: Buffer overflow in tiffsplit [CVE-2006-2656] Package: libtiff-tools; Maintainer for libtiff-tools is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for libtiff-tools is src:tiff (PTS, buildd, popcon) Reported by: Martin Pitt <martinpitt@ubuntucom> Date: Thu, 1 Jun ...
A buffer overflow has been found in the tiff2pdf utility By tricking an user into processing a specially crafted TIF file with tiff2pdf, this could potentially be exploited to execute arbitrary code with the privileges of the user (CVE-2006-2193) ...
Several problems have been discovered in the TIFF library The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2006-2193 SuSE discovered a buffer overflow in the conversion of TIFF files into PDF documents which could be exploited when tiff2pdf is used eg in a printer filter CVE-2006-2656 The ti ...

Exploits

# tiffsplit (libtiff <= 382) local stack buffer overflow PoC tiffsplit from libtiff (wwwremotesensingorg/libtiff/) is vulnerable to a bss-based and stack-based overflow, but, I just wrote the concept c0de for stack-based b0f 'cause I don't know how to take advantage of the overwritten bss data (after the overflow, that data is overwr ...