[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Arbitrary code execution vulnerability in Python Imaging Library (PIL) and Pillow via unspecified vectors

ID: oval:org.secpod.oval:def:23619Date: (C)2015-02-27   (M)2023-10-26
Class: VULNERABILITYFamily: unix




The host is installed with Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py. Successful exploitation allows remote attackers to execute arbitrary commands.

Platform:
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 5
Product:
python-imaging
python-pillow
Reference:
CVE-2014-3007
CVE    1
CVE-2014-3007

© SecPod Technologies