CVE-2014-1933

EUVD-2014-0042
The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
2.1 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:N/I:P/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 29%
Affected Products (NVD)
VendorProductVersion
pythonpillow
𝑥
≤ 2.3.0
pythonwarepython_imaging_library
𝑥
≤ 1.1.7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pillow
bookworm
9.4.0-1.1+deb12u1
fixed
bookworm (security)
9.4.0-1.1+deb12u1
fixed
bullseye
8.1.2+dfsg-0.3+deb11u2
fixed
bullseye (security)
8.1.2+dfsg-0.3+deb11u2
fixed
sid
10.4.0-1
fixed
squeeze
no-dsa
trixie
10.4.0-1
fixed
wheezy
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pillow
lucid
dne
precise
dne
quantal
dne
saucy
dne
python-imaging
lucid
Fixed 1.1.7-1ubuntu0.2
released
precise
Fixed 1.1.7-4ubuntu0.12.04.1
released
quantal
Fixed 1.1.7-4ubuntu0.12.10.1
released
saucy
Fixed 1.1.7+2.0.0-1ubuntu1.1
released
Common Weakness Enumeration