-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2021-27923 - High Severity Vulnerability
Vulnerable Library - Pillow-5.4.1-cp36-cp36m-manylinux1_x86_64.whl
Python Imaging Library (Fork)
Library home page: https://files.pythonhosted.org/packages/85/5e/e91792f198bbc5a0d7d3055ad552bc4062942d27eaf75c3e2783cf64eae5/Pillow-5.4.1-cp36-cp36m-manylinux1_x86_64.whl
Path to dependency file: testplan
Path to vulnerable library: testplan,testplan/requirements.txt
Dependency Hierarchy:
- ❌ Pillow-5.4.1-cp36-cp36m-manylinux1_x86_64.whl (Vulnerable Library)
Vulnerability Details
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
Publish Date: 2021-03-03
URL: CVE-2021-27923
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://pillow.readthedocs.io/en/stable/releasenotes/8.1.2.html
Release Date: 2021-03-03
Fix Resolution: Pillow - 8.1.2
- Check this box to open an automated fix PR