Upstream information

CVE-2006-2656 at MITRE

Description

Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 179051 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SuSE Linux Desktop 1.0
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
  • tiff >= 3.5.7-387
Builds
YOU Patch Nr: 11054
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
Open Enterprise Server
  • tiff >= 3.6.1-38.30
Builds
YOU Patch Nr: 11054
SUSE LINUX 10.0
  • tiff >= 3.7.3-2.4
SUSE LINUX 10.1
  • tiff >= 3.8.2-5.6
SUSE LINUX 9.1 for IA32
SUSE LINUX 9.1 for x86-64
  • tiff >= 3.6.1-38.30
SUSE LINUX 9.2
  • tiff >= 3.6.1-47.10
SUSE LINUX 9.3
  • tiff >= 3.7.1-7.6