First published: Fri Nov 04 2016(Updated: )
Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the `Image.core.map_buffer` in `map.c` component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/pillow | >=0<3.3.2 | 3.3.2 |
Python Imaging Library (Pillow) | <=3.3.1 | |
Debian | =8.0 |
https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9189 has been classified as a medium severity vulnerability.
To fix CVE-2016-9189, upgrade Pillow to version 3.3.2 or later.
CVE-2016-9189 allows context-dependent attackers to obtain sensitive information via crafted image files.
Pillow versions before 3.3.2 are affected by CVE-2016-9189.
CVE-2016-9189 impacts the `Image.core.map_buffer` within the `map.c` component.