Description
Buffer overflow in the t2p_write_pdf_string function in tiff2pdf in libtiff 3.8.2 and earlier allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a TIFF file with a DocumentName tag that contains UTF-8 characters, which triggers the overflow when a character is sign extended to an integer that produces more digits than expected in an sprintf call.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1091-1 | New TIFF packages fix arbitrary code execution |
EUVD |
EUVD-2006-2194 | Buffer overflow in the t2p_write_pdf_string function in tiff2pdf in libtiff 3.8.2 and earlier allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a TIFF file with a DocumentName tag that contains UTF-8 characters, which triggers the overflow when a character is sign extended to an integer that produces more digits than expected in an sprintf call. |
Ubuntu USN |
USN-289-1 | tiff vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-07T17:43:27.935Z
Reserved: 2006-05-04T00:00:00.000Z
Link: CVE-2006-2193
No data.
Status : Modified
Published: 2006-06-08T19:06:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2006-2193
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN