CVE-2016-3076Improper Restriction of Operations within the Bounds of a Memory Buffer in Pillow

Severity
5.5MEDIUMNVD
EPSS
0.5%
top 36.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 24
Latest updateMay 17

Description

Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 through 3.1.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted Jpeg2000 file.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

PyPIpython/pillow2.5.03.1.2
Debianpython/pillow< 3.2.0-1+3
NVDpython/pillow14 versions+13

🔴Vulnerability Details

4
GHSA
Pillow Buffer overflow in Jpeg2KEncode.c2022-05-17
OSV
Pillow Buffer overflow in Jpeg2KEncode.c2022-05-17
OSV
CVE-2016-3076: Heap-based buffer overflow in the j2k_encode_entry function in Pillow 22017-04-24
CVEList
CVE-2016-3076: Heap-based buffer overflow in the j2k_encode_entry function in Pillow 22017-04-24

📋Vendor Advisories

2
Red Hat
python-pillow: buffer overflow in Jpeg2kEncode.c2016-04-04
Debian
CVE-2016-3076: pillow - Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 thro...2016

💬Community

2
Bugzilla
CVE-2016-3076 python-pillow: buffer overflow in Jpeg2kEncode.c [fedora-all]2016-04-14
Bugzilla
CVE-2016-3076 python-pillow: buffer overflow in Jpeg2kEncode.c2016-03-29
CVE-2016-3076 — Python Pillow vulnerability | cvebase