Improper Access Control Affecting pillow package, versions <3.4.2-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.37% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-PILLOW-320877
  • published4 Nov 2016
  • disclosed4 Nov 2016

Introduced: 4 Nov 2016

CVE-2016-9190  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade Debian:unstable pillow to version 3.4.2-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream pillow package and not the pillow package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.