Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.
2006-05-30T18:02:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | libtiff | libtiff | ≤ 3.8.2 | Yes |
Application | libtiff | libtiff | 3.4 | Yes |
Application | libtiff | libtiff | 3.5.1 | Yes |
Application | libtiff | libtiff | 3.5.2 | Yes |
Application | libtiff | libtiff | 3.5.3 | Yes |
Application | libtiff | libtiff | 3.5.4 | Yes |
Application | libtiff | libtiff | 3.5.5 | Yes |
Application | libtiff | libtiff | 3.5.6 | Yes |
Application | libtiff | libtiff | 3.5.7 | Yes |
Application | libtiff | libtiff | 3.6.0 | Yes |
Application | libtiff | libtiff | 3.6.1 | Yes |
Application | libtiff | libtiff | 3.7.0 | Yes |
Application | libtiff | libtiff | 3.7.1 | Yes |
Application | libtiff | libtiff | 3.8.0 | Yes |
Application | libtiff | libtiff | 3.8.1 | Yes |