PT-2012-16: Buffer Overflow in Pillow library
(PT-2012-16) Positive Technologies Security Advisory
Buffer Overflow in Pillow library
Version: 1.7.8 and earlier
Severity level: Medium
Impact: Buffer Overflow
Access Vector: Remote
Base Score: 4.3
CVE: not assigned
Pillow is an open source Python library that is developed to handle images.
The specialists of the Positive Research center have detected a Buffer Overflow vulnerability in Pillow library.
Vulnerablity in libImaging/Storage.c file
186 strcpy(im->mode, mode);
im->mode is an array of 5 bytes. If an attacker manages to load an image with YCbCr color space, it cause off-by-one error because of terminated NULL-byte.
Example of a vulnerable code:
from PIL import Image
How to fix
Update your software up to the latest version
25.06.2012 - Vendor gets vulnerability details
18.07.2012 - Vulnerability details were sent to CERT
15.03.2013 - Vendor releases fixed version and details
10.10.2013 - Public disclosure
The vulnerability was detected by Pavel Toporkov, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research:
About Positive Technologies
Positive Technologies www.ptsecurity.com is among the key players in the IT security market in Russia.
The principal activities of the company include the development of integrated tools for information security monitoring (MaxPatrol); providing IT security consulting services and technical support; development of the Securitylab leading Russian information security portal.
Among the clients of Positive Technologies, there are more than 40 state enterprises, more than 50 banks and financial organizations, 20 telecommunication companies, more than 40 plant facilities, as well as IT, service and retail companies from Russia, the CIS countries, the Baltic States, China, Ecuador, Germany, Great Britain, Holland, Iran, Israel, Japan, Mexico, the Republic of South Africa, Thailand, Turkey, and the USA.
Positive Technologies is a team of highly skilled developers, advisers and experts with years of vast hands-on experience. The company specialists possess professional titles and certificates; they are the members of various international societies and are actively involved in the IT security field development.