| Vulnerability Name: | CVE-2021-28677 (CCN-203002) | ||||||||||||||||||||||||||||
| Assigned: | 2021-01-17 | ||||||||||||||||||||||||||||
| Published: | 2021-01-17 | ||||||||||||||||||||||||||||
| Updated: | 2021-09-14 | ||||||||||||||||||||||||||||
| Summary: | An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of \r and \n as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening. | ||||||||||||||||||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-noinfo CWE-20 | ||||||||||||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-28677 Source: XF Type: UNKNOWN pillow-cve202128677-dos(203002) Source: MISC Type: Patch, Third Party Advisory https://github.com/python-pillow/Pillow/pull/5377 Source: MLIST Type: Third Party Advisory [debian-lts-announce] 20210722 [SECURITY] [DLA 2716-1] pillow security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-77756994ba Source: CCN Type: Pillow Web site Pillow Source: MISC Type: Third Party Advisory https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28677-fix-eps-dos-on-open Source: GENTOO Type: Third Party Advisory GLSA-202107-33 | ||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||