The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2012/07/31/1 | mailing list |
https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/ | patch vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2012:143 | vendor advisory |
http://www.ubuntu.com/usn/USN-1560-1 | vendor advisory |
http://www.openwall.com/lists/oss-security/2012/07/31/2 | mailing list |
http://www.debian.org/security/2012/dsa-2529 | vendor advisory |