Vulnerability Name:

CVE-2020-5311 (CCN-173924)

Assigned:2020-01-03
Published:2020-01-03
Updated:2020-08-18
Summary:libImaging/SgiRleDecode.c in Pillow before 6.2.2 has an SGI buffer overflow.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
9.8 Critical (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-120
CWE-787
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2020-5311

Source: REDHAT
Type: Third Party Advisory
RHSA-2020:0566

Source: REDHAT
Type: Third Party Advisory
RHSA-2020:0580

Source: XF
Type: UNKNOWN
pillow-sgi-cve20205311-bo(173924)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/python-pillow/Pillow/commit/a79b65c47c7dc6fe623aadf09aa6192fc54548f3

Source: FEDORA
Type: Issue Tracking, Third Party Advisory
FEDORA-2020-df444e464e

Source: FEDORA
Type: Issue Tracking, Third Party Advisory
FEDORA-2020-5cdbb19cca

Source: CCN
Type: Pillow (PIL Fork) Docs
6.2.2 Release Notes

Source: MISC
Type: Release Notes, Third Party Advisory
https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html

Source: UBUNTU
Type: Third Party Advisory
USN-4272-1

Source: DEBIAN
Type: Third Party Advisory
DSA-4631

Source: CCN
Type: IBM Security Bulletin 6211878 (PowerAI)
A security vulnerability has been identified in Pillow shipped with IBM Watson Machine Learning Community Edition (WMLCE) containers

Vulnerable Configuration:Configuration 1:
  • cpe:/a:python:pillow:*:*:*:*:*:*:*:* (Version < 6.2.2)

  • Configuration 2:
  • cpe:/o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:30:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:31:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:python:pillow:2.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:2.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:2.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:3.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:3.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:2.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:2.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:3.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:3.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:4.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:4.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:4.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:4.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:4.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:5.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:5.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:5.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:5.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:6.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:python:pillow:6.2.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20205311
    V
    CVE-2020-5311
    2022-05-22
    oval:com.redhat.rhsa:def:20200580
    P
    RHSA-2020:0580: python-pillow security update (Important)
    2020-02-24
    oval:com.ubuntu.disco:def:202053110000000
    V
    CVE-2020-5311 on Ubuntu 19.04 (disco) - medium.
    2020-01-03
    oval:com.ubuntu.bionic:def:202053110000000
    V
    CVE-2020-5311 on Ubuntu 18.04 LTS (bionic) - medium.
    2020-01-03
    oval:com.ubuntu.xenial:def:202053110000000
    V
    CVE-2020-5311 on Ubuntu 16.04 LTS (xenial) - medium.
    2020-01-03
    BACK
    python pillow *
    canonical ubuntu linux 18.04
    canonical ubuntu linux 19.10
    debian debian linux 9.0
    debian debian linux 10.0
    fedoraproject fedora 30
    fedoraproject fedora 31
    python pillow 2.3.0
    python pillow 2.3.1
    python pillow 2.6.2
    python pillow 2.7.0
    python pillow 3.1.0
    python pillow 3.3.1
    python pillow 2.5.0
    python pillow 2.8.0
    python pillow 3.0.0
    python pillow 3.3.2
    python pillow 3.4.0
    python pillow 4.0.0
    python pillow 4.1.0
    python pillow 4.1.1
    python pillow 4.2.0
    python pillow 4.2.1
    python pillow 4.3.0
    python pillow 5.0.0
    python pillow 5.1.0
    python pillow 5.2.0
    python pillow 5.3.0
    python pillow 5.4.0
    python pillow 5.4.1
    python pillow 6.0.0
    python pillow 6.2.0