Vulnerability Details : CVE-2014-9601
Pillow before 2.7.0 allows remote attackers to cause a denial of service via a compressed text chunk in a PNG image that has a large size when it is decompressed.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2014-9601
- cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-9601
1.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-9601
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-9601
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-9601
-
http://pillow.readthedocs.org/releasenotes/2.7.0.html
Maze Found | Read the DocsVendor Advisory
-
https://github.com/python-pillow/Pillow/pull/1060
Fix potential PNG decompression DOS by wiredfool · Pull Request #1060 · python-pillow/Pillow · GitHubVendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148442.html
[SECURITY] Fedora 21 Update: python-pillow-2.6.1-2.fc21Third Party Advisory
-
https://www.djangoproject.com/weblog/2015/jan/02/pillow-security-release/
Security Advisory: Pillow security release | Weblog | DjangoThird Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2015-04/msg00056.html
openSUSE-SU-2015:0798-1: moderate: Security update for python-PillowThird Party Advisory
-
http://www.securityfocus.com/bid/77758
Opensuse CVE-2014-9601 Denial-Of-Service Vulnerability
-
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
Oracle Solaris Third Party Bulletin - July 2015Third Party Advisory
Jump to