[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

Arbitrary code execution vulnerability in Python Imaging Library (PIL) and Pillow via unspecified vectors

ID: oval:org.secpod.oval:def:23619Date: (C)2015-02-27   (M)2015-12-16
Class: VULNERABILITYFamily: unix




The host is installed with Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py. Successful exploitation allows remote attackers to execute arbitrary commands.

Platform:
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 5
Product:
python-imaging
python-pillow
Reference:
CVE-2014-3007
CVE    1
CVE-2014-3007

© 2013 SecPod Technologies