Описание
Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
A vulnerability was found in python-pillow. A crafted image file with negative dimensions could cause a buffer to be under-allocated, leading to arbitrary writes on the heap which could cause a crash or, potentially, code execution.
Отчет
Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | python-imaging | Will not fix | ||
| Red Hat Enterprise Linux 6 | python-imaging | Will not fix | ||
| Red Hat Enterprise Linux 7 | python-pillow | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
7.3 High
CVSS3
6.8 Medium
CVSS2
Связанные уязвимости
Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
Pillow before 3.3.2 allows context-dependent attackers to execute arbi ...
Arbitrary code using "crafted image file" approach affecting Pillow
EPSS
7.3 High
CVSS3
6.8 Medium
CVSS2