Описание
The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
python-django | fixed | 1.4.1-1 | package |
Примечания
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/
https://www.openwall.com/lists/oss-security/2012/07/31/1
https://www.openwall.com/lists/oss-security/2012/07/31/2
EPSS
Связанные уязвимости
The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.
The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.
Django vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer
EPSS