Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and previous versions might might allow malicious users to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
libtiff libtiff 3.6.1 |
||
libtiff libtiff 3.8.0 |
||
libtiff libtiff 3.8.1 |
||
libtiff libtiff 3.4 |
||
libtiff libtiff 3.5.7 |
||
libtiff libtiff 3.7.0 |
||
libtiff libtiff 3.6.0 |
||
libtiff libtiff 3.5.3 |
||
libtiff libtiff 3.7.1 |
||
libtiff libtiff 3.5.4 |
||
libtiff libtiff 3.5.2 |
||
libtiff libtiff 3.5.5 |
||
libtiff libtiff 3.5.1 |
||
libtiff libtiff 3.5.6 |
||
libtiff libtiff |