{"id":"CVE-2006-2656","details":"Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename.  NOTE: tiffsplit is not setuid.  If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.","modified":"2026-02-04T03:18:55.930788Z","published":"2006-05-30T18:02:00Z","related":["openSUSE-SU-2024:11461-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/20501"},{"type":"ADVISORY","url":"http://secunia.com/advisories/20520"},{"type":"ADVISORY","url":"http://secunia.com/advisories/20766"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21002"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200607-03.xml"},{"type":"ADVISORY","url":"http://www.debian.org/security/2006/dsa-1091"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:095"},{"type":"FIX","url":"https://www.redhat.com/archives/fedora-package-announce/2006-May/msg00127.html"},{"type":"WEB","url":"http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html"},{"type":"WEB","url":"http://marc.info/?l=vuln-dev&m=114857412916909&w=2"},{"type":"WEB","url":"https://usn.ubuntu.com/289-1/"}],"schema_version":"1.7.3"}