Pillow 缓冲区错误漏洞

admin 2024-01-14 01:56:24 YS 来源:ZONE.CI 全球网 0 阅读模式
> Pillow 缓冲区错误漏洞

Pillow 缓冲区错误漏洞

CNNVD-ID编号 CNNVD-202001-051 CVE编号 CVE-2020-5311
发布时间 2020-01-02 更新时间 2020-07-13
漏洞类型 缓冲区错误 漏洞来源 N/A
危险等级 超危 威胁类型 远程
厂商 N/A

漏洞介绍

Pillow是一款基于Python的图像处理库。

Pillow 6.2.2之前版本中的libImaging/SgiRleDecode.c文件存在缓冲区错误漏洞,该漏洞源于程序没有正确检查边界。远程攻击者可借助特制SGI文件利用该漏洞在系统上执行任意代码,或者导致应用程序崩溃。

漏洞补丁

目前厂商已发布升级了Pillow 缓冲区错误漏洞的补丁,Pillow 缓冲区错误漏洞的补丁获取链接:

参考网址

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2020:0580

来源:MISC

链接:https://github.com/python-pillow/Pillow/commit/a79b65c47c7dc6fe623aadf09aa6192fc54548f3

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/

来源:UBUNTU

链接:https://usn.ubuntu.com/4272-1/

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2020:0566

来源:DEBIAN

链接:https://www.debian.org/security/2020/dsa-4631

来源:pillow.readthedocs.io

链接:https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4272-1/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156245/Ubuntu-Security-Notice-USN-4272-1.html

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Pillow-buffer-overflow-via-libImaging-SgiRleDecode-c-31475

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156466/Red-Hat-Security-Advisory-2020-0566-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0638/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0659/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0448/

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2020-5311

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156514/Red-Hat-Security-Advisory-2020-0580-01.html

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202001-051

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0