CVE-2014-1933
The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.0011 (0.1%)
Percentil: 29.0%
EPSS: 2026-05-06
Afecta
python:pillowpythonware:python_imaging_libraryDescripción técnica
The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.
Publicada: 17/4/2014, 14:55:11
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html
- http://www.openwall.com/lists/oss-security/2014/02/10/15
- http://www.openwall.com/lists/oss-security/2014/02/11/1
- http://www.securityfocus.com/bid/65513
- http://www.ubuntu.com/usn/USN-2168-1
- https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7
- https://security.gentoo.org/glsa/201612-52
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html