CVE-2014-1933

low

Description

The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.

References

http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html

http://www.openwall.com/lists/oss-security/2014/02/10/15

http://www.openwall.com/lists/oss-security/2014/02/11/1

http://www.securityfocus.com/bid/65513

http://www.ubuntu.com/usn/USN-2168-1

https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7

https://security.gentoo.org/glsa/201612-52

Details

Source: MITRE

Published: 2014-04-17

Updated: 2017-07-01

Type: CWE-264

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW