PyPi: Pillow

CVE-2020-10378

Safety vulnerability ID: 38449

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jun 25, 2020 Updated at Dec 05, 2024
Scan your Python projects for vulnerabilities →

Advisory

In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when reading PCX files where state->shuffle is instructed to read beyond state->buffer.

Affected package

pillow

Latest version: 11.0.0

Python Imaging Library (Fork)

Affected versions

Fixed versions

Vulnerability changelog

In libImaging/PcxDecode.c in Pillow before 6.2.3 and 7.x before 7.0.1, an out-of-bounds read can occur when reading PCX files where state->shuffle is instructed to read beyond state->buffer.


MISC:https://github.com/python-pillow/Pillow/commit/6a83e4324738bb0452fbe8074a995b1c73f08de7#diff-9478f2787e3ae9668a15123b165c23ac: https://github.com/python-pillow/Pillow/commit/6a83e4324738bb0452fbe8074a995b1c73f08de7#diff-9478f2787e3ae9668a15123b165c23ac
MISC:https://github.com/python-pillow/Pillow/commits/master/src/libImaging: https://github.com/python-pillow/Pillow/commits/master/src/libImaging
MISC:https://github.com/python-pillow/Pillow/pull/4538: https://github.com/python-pillow/Pillow/pull/4538
MISC:https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html: https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html
MISC:https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html: https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 5.5

CVSS v3 Details

MEDIUM 5.5
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
NONE
Availability Availability (A)
NONE

CVSS v2 Details

MEDIUM 4.3
Access Vector (AV)
NETWORK
Access Complexity (AC)
MEDIUM
Authentication (Au)
NONE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
NONE
Availability Impact (A)
NONE