Miggo Logo

CVE-2016-0740: Pillow Buffer overflow in ImagingLibTiffDecode

6.5

CVSS Score
3.0

Basic Information

EPSS Score
0.49414%
Published
7/24/2018
Updated
10/9/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
pillowpip>= 0, < 3.1.13.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is explicitly tied to ImagingLibTiffDecode in TiffDecode.c. The GitHub patch changes the 'size' variable from int to tsize_t (a size type appropriate for libtiff operations), directly addressing the integer overflow risk. The commit message and CVE description confirm this function as the source of the buffer overflow vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*u***r ov*r*low in t** `Im**in*Li*Ti*****o**` *un*tion in `li*Im**in*/Ti*****o**.*` in Pillow ***or* *.*.* *llows r*mot* *tt**k*rs to ov*rwrit* m*mory vi* * *r**t** TI** *il*.

Reasoning

T** vuln*r**ility is *xpli*itly ti** to `Im**in*Li*Ti*****o**` in `Ti*****o**.*`. T** *it*u* p*t** ***n**s t** 'siz*' v*ri**l* *rom int to `tsiz*_t` (* siz* typ* *ppropri*t* *or li*ti** op*r*tions), *ir**tly ***r*ssin* t** int***r ov*r*low risk. T**