Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201612-52 | vendor advisory |
http://www.securityfocus.com/bid/94234 | vdb entry third party advisory |
https://github.com/python-pillow/Pillow/issues/2105 | issue tracking third party advisory patch |
http://www.debian.org/security/2016/dsa-3710 | third party advisory vendor advisory |
http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html | vendor advisory |
https://github.com/python-pillow/Pillow/pull/2146/commits/5d8a0be45aad78c5a22c8d099118ee26ef8144af | issue tracking third party advisory patch |