CVE-2006-2026

CVSS V2 Medium 6.5 CVSS V3 None
Description
Double free vulnerability in tif_jpeg.c in libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers errors related to "setfield/getfield methods in cleanup functions."
Overview
  • CVE ID
  • CVE-2006-2026
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2006-04-25T23:02:00
  • Last Modified Date
  • 2018-10-03T21:40:25
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:* 1 OR 3.8.0
cpe:2.3:a:libtiff:libtiff:3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:libtiff:libtiff:3.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:libtiff:libtiff:3.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:libtiff:libtiff:3.5.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:libtiff:libtiff:3.5.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:libtiff:libtiff:3.5.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:libtiff:libtiff:3.5.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:libtiff:libtiff:3.5.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:libtiff:libtiff:3.6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:libtiff:libtiff:3.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:libtiff:libtiff:3.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:libtiff:libtiff:3.7.1:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8
  • Impact Score
  • 6.4
References
Reference URL Reference Tags
http://bugzilla.remotesensing.org/show_bug.cgi?id=1102 Exploit Patch
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189933 Exploit Patch
http://www.securityfocus.com/bid/17733
http://secunia.com/advisories/19838 Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_04_28.html
http://secunia.com/advisories/19897 Vendor Advisory
http://secunia.com/advisories/19936 Vendor Advisory
http://secunia.com/advisories/19949 Vendor Advisory
http://www.trustix.org/errata/2006/0024
http://www.debian.org/security/2006/dsa-1054
http://secunia.com/advisories/19964 Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0425.html
http://secunia.com/advisories/20021 Vendor Advisory
http://secunia.com/advisories/20023 Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200605-17.xml
http://secunia.com/advisories/20345 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-119.htm
ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
http://secunia.com/advisories/20210 Vendor Advisory
http://secunia.com/advisories/20667 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:082
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103099-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201332-1
http://www.vupen.com/english/advisories/2006/1563
https://exchange.xforce.ibmcloud.com/vulnerabilities/26135
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11389
https://usn.ubuntu.com/277-1/
History
Created Old Value New Value Data Type Notes
2022-05-10 18:36:39 Added to TrackCVE