First published: Mon Aug 25 2014(Updated: )
`PIL/IcnsImagePlugin.py` in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 allows remote attackers to cause a denial of service via a crafted block size.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/pillow | >=2.5<2.5.2 | 2.5.2 |
pip/pillow | <2.3.2 | 2.3.2 |
Python Imaging Library (PIL) | ||
Python Imaging Library (Pillow) | <=2.3.1 | |
Python Imaging Library (Pillow) | =2.3.0 | |
Python Imaging Library (Pillow) | =2.5.0 | |
Python Imaging Library (Pillow) | =2.5.1 | |
Python Imaging Library (Pillow) | =2.5.2 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3589 has a severity level classified as moderate due to its potential to cause denial of service.
To fix CVE-2014-3589, upgrade to Pillow version 2.5.2 or later, or 2.3.2 for earlier versions.
CVE-2014-3589 affects Pillow versions prior to 2.5.2 and 2.3.x versions below 2.3.2.
CVE-2014-3589 is a denial of service vulnerability caused by a crafted block size in the IcnsImagePlugin.py.
CVE-2014-3589 can affect multiple operating systems that utilize the vulnerable versions of the Pillow library.