Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-27923
HistoryMar 03, 2021 - 12:00 a.m.

CVE-2021-27923

2021-03-0300:00:00
ubuntu.com
ubuntu.com
9

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

64.0%

Pillow before 8.1.1 allows attackers to cause a denial of service (memory
consumption) because the reported size of a contained image is not properly
checked for an ICO container, and thus an attempted memory allocation can
be very large.

Notes

Author Note
mdeslaur while this is mentioned in the 8.1.1 release notes, it doesn’t seem to be mentioned in the CHANGES file, and I can’t seem to locate the commits that fix this in 8.1.1 vs 8.1.0 This was actually fixed in 8.1.2.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchpillow< 5.1.0-1ubuntu0.5UNKNOWN
ubuntu20.04noarchpillow< 7.0.0-4ubuntu0.3UNKNOWN
ubuntu20.10noarchpillow< 7.2.0-1ubuntu0.2UNKNOWN
ubuntu14.04noarchpillow< anyUNKNOWN
ubuntu16.04noarchpillow< 3.1.2-0ubuntu1.6UNKNOWN
ubuntu20.04noarchpillow-python2< anyUNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

64.0%