gsd-2022-30595
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
libImaging/TgaRleDecode.c in Pillow 9.1.0 has a heap buffer overflow in the processing of invalid TGA image files.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-30595", "description": "libImaging/TgaRleDecode.c in Pillow 9.1.0 has a heap buffer overflow in the processing of invalid TGA image files.", "id": "GSD-2022-30595", "references": [ "https://www.suse.com/security/cve/CVE-2022-30595.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-30595" ], "details": "libImaging/TgaRleDecode.c in Pillow 9.1.0 has a heap buffer overflow in the processing of invalid TGA image files.", "id": "GSD-2022-30595", "modified": "2023-12-13T01:19:36.729742Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-30595", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libImaging/TgaRleDecode.c in Pillow 9.1.0 has a heap buffer overflow in the processing of invalid TGA image files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/python-pillow/Pillow/blob/main/src/libImaging/TgaRleDecode.c", "refsource": "MISC", "url": "https://github.com/python-pillow/Pillow/blob/main/src/libImaging/TgaRleDecode.c" }, { "name": "https://pillow.readthedocs.io/en/stable/releasenotes/9.1.1.html", "refsource": "MISC", "url": "https://pillow.readthedocs.io/en/stable/releasenotes/9.1.1.html" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "==9.1.0", "affected_versions": "Version 9.1.0", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-787", "CWE-937" ], "date": "2022-06-03", "description": "When reading a TGA file with RLE packets that cross scan lines, Pillow reads the information past the end of the first line without deducting that from the length of the remaining file data. This vulnerability was introduced in Pillow 9.1.0, and can cause a heap buffer overflow. Opening an image with a zero or negative height has been found to bypass a decompression bomb check. This will now raise a `SyntaxError` instead, in turn raising a `PIL.UnidentifiedImageError`.", "fixed_versions": [ "9.1.1" ], "identifier": "CVE-2022-30595", "identifiers": [ "CVE-2022-30595", "GHSA-hr8g-f6r6-mr22" ], "not_impacted": "All versions before 9.1.0, all versions after 9.1.0", "package_slug": "pypi/Pillow", "pubdate": "2022-05-25", "solution": "Upgrade to version 9.1.1 or above.", "title": "Buffer over-flow in Pillow", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2022-30595", "https://github.com/python-pillow/Pillow/blob/main/src/libImaging/TgaRleDecode.c", "https://pillow.readthedocs.io/en/stable/releasenotes/9.1.1.html", "https://github.com/advisories/GHSA-hr8g-f6r6-mr22" ], "uuid": "187d813f-2127-4cde-aa1d-98b18d07c8f6" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:python:pillow:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-30595" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "libImaging/TgaRleDecode.c in Pillow 9.1.0 has a heap buffer overflow in the processing of invalid TGA image files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://pillow.readthedocs.io/en/stable/releasenotes/9.1.1.html", "refsource": "MISC", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://pillow.readthedocs.io/en/stable/releasenotes/9.1.1.html" }, { "name": "https://github.com/python-pillow/Pillow/blob/main/src/libImaging/TgaRleDecode.c", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/python-pillow/Pillow/blob/main/src/libImaging/TgaRleDecode.c" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2022-06-03T14:25Z", "publishedDate": "2022-05-25T12:15Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.