{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-05-24T00:00:00.000Z","descriptions":[{"lang":"en","value":"Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename.  NOTE: tiffsplit is not setuid.  If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-03T20:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"FEDORA-2006-591","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://www.redhat.com/archives/fedora-package-announce/2006-May/msg00127.html"},{"name":"20520","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20520"},{"name":"20766","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20766"},{"name":"GLSA-200607-03","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-200607-03.xml"},{"name":"20501","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20501"},{"name":"DSA-1091","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-1091"},{"name":"SUSE-SR:2006:014","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html"},{"name":"MDKSA-2006:095","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:095"},{"name":"21002","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/21002"},{"name":"20060524 tiffsplit (libtiff <= 3.8.2) bss & stack buffer overflow...","tags":["mailing-list","x_refsource_VULN-DEV"],"url":"http://marc.info/?l=vuln-dev&m=114857412916909&w=2"},{"name":"USN-289-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/289-1/"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T17:58:51.709Z"},"title":"CVE Program Container","references":[{"name":"FEDORA-2006-591","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://www.redhat.com/archives/fedora-package-announce/2006-May/msg00127.html"},{"name":"20520","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20520"},{"name":"20766","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20766"},{"name":"GLSA-200607-03","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-200607-03.xml"},{"name":"20501","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20501"},{"name":"DSA-1091","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-1091"},{"name":"SUSE-SR:2006:014","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html"},{"name":"MDKSA-2006:095","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:095"},{"name":"21002","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/21002"},{"name":"20060524 tiffsplit (libtiff <= 3.8.2) bss & stack buffer overflow...","tags":["mailing-list","x_refsource_VULN-DEV","x_transferred"],"url":"http://marc.info/?l=vuln-dev&m=114857412916909&w=2"},{"name":"USN-289-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/289-1/"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2006-2656","datePublished":"2006-05-30T18:00:00.000Z","dateReserved":"2006-05-30T00:00:00.000Z","dateUpdated":"2024-08-07T17:58:51.709Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}