[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2023-2286 --- python-pillow

ID: oval:org.secpod.oval:def:1701806Date: (C)2023-10-26   (M)2023-10-26
Class: PATCHFamily: unix




The load_djpeg function in JpegImagePlugin.py, Ghostscript function in EpsImagePlugin.py, load function in IptcImagePlugin.py, and _copy function in Image.py in Python Image Library 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file. The JpegImagePlugin.py and EpsImagePlugin.py scripts in Python Image Library 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes. Python Image Library 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py

Platform:
Amazon Linux 2
Product:
python-pillow
Reference:
ALAS2-2023-2286
CVE-2014-1932
CVE-2014-1933
CVE-2014-3007
CVE    3
CVE-2014-1932
CVE-2014-1933
CVE-2014-3007
CPE    2
cpe:/a:python:python-pillow
cpe:/o:amazon:linux:2

© SecPod Technologies