Total vulnerabilities in the database
Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename. NOTE: tiffsplit is not setuid. If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.
Software | From | Fixed in |
---|---|---|
libtiff / libtiff | 3.6.1 | 3.6.1.x |
libtiff / libtiff | 3.8.0 | 3.8.0.x |
libtiff / libtiff | 3.8.1 | 3.8.1.x |
libtiff / libtiff | 3.4 | 3.4.x |
libtiff / libtiff | 3.5.7 | 3.5.7.x |
libtiff / libtiff | 3.7.0 | 3.7.0.x |
libtiff / libtiff | 3.6.0 | 3.6.0.x |
libtiff / libtiff | 3.5.3 | 3.5.3.x |
libtiff / libtiff | 3.7.1 | 3.7.1.x |
libtiff / libtiff | 3.5.4 | 3.5.4.x |
libtiff / libtiff | 3.5.2 | 3.5.2.x |
libtiff / libtiff | 3.5.5 | 3.5.5.x |
libtiff / libtiff | 3.5.1 | 3.5.1.x |
libtiff / libtiff | 3.5.6 | 3.5.6.x |
libtiff / libtiff | - | 3.8.2.x |