Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-1933

Опубликовано: 17 апр. 2014
Источник: debian
EPSS Низкий

Описание

The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pillowfixed2.4.0-1package
python-imagingremovedpackage
python-imagingno-dsasqueezepackage
python-imagingno-dsawheezypackage

EPSS

Процентиль: 30%
0.00111
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.

redhat
около 12 лет назад

The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.

nvd
почти 12 лет назад

The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.

CVSS3: 4
github
больше 5 лет назад

Pillow Temporary file name leakage

EPSS

Процентиль: 30%
0.00111
Низкий