The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201612-52 | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/02/10/15 | mailing list |
https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7 | patch exploit |
http://www.openwall.com/lists/oss-security/2014/02/11/1 | mailing list |
http://www.ubuntu.com/usn/USN-2168-1 | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html | vendor advisory |
http://www.securityfocus.com/bid/65513 | vdb entry |