Search for vulnerabilities
Vulnerability details: VCID-bj5f-81jk-aaar
Vulnerability ID VCID-bj5f-81jk-aaar
Aliases BIT-2020-5310
BIT-pillow-2020-5310
CVE-2020-5310
GHSA-vcqg-3p29-xw73
PYSEC-2020-81
Summary libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-5310.html
rhas Moderate https://access.redhat.com/errata/RHSA-2021:0420
cvssv3 8.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-5310.json
epss 0.00275 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00275 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00275 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00275 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00275 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00275 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00275 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00275 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00275 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00275 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00275 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00275 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00315 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00315 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.0051 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.00513 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
epss 0.01727 https://api.first.org/data/v1/epss?cve=CVE-2020-5310
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1789538
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5310
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-vcqg-3p29-xw73
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-vcqg-3p29-xw73
cvssv3.1 8.8 https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-81.yaml
generic_textual CRITICAL https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-81.yaml
cvssv3.1 8.8 https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml
generic_textual CRITICAL https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml
cvssv3.1 6.7 https://github.com/python-pillow/Pillow
generic_textual MODERATE https://github.com/python-pillow/Pillow
cvssv3.1 8.8 https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4
generic_textual CRITICAL https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4
cvssv3.1 7.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A
cvssv3.1 7.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P
cvssv2 6.8 https://nvd.nist.gov/vuln/detail/CVE-2020-5310
cvssv3 8.8 https://nvd.nist.gov/vuln/detail/CVE-2020-5310
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2020-5310
cvssv3.1 7.1 https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html
generic_textual HIGH https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html
cvssv3.1 7.1 https://usn.ubuntu.com/4272-1
generic_textual HIGH https://usn.ubuntu.com/4272-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-4272-1
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-5310.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-5310.json
https://api.first.org/data/v1/epss?cve=CVE-2020-5310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5310
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-81.yaml
https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/
https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html
https://usn.ubuntu.com/4272-1
https://usn.ubuntu.com/4272-1/
https://usn.ubuntu.com/usn/usn-4272-1
1789538 https://bugzilla.redhat.com/show_bug.cgi?id=1789538
948224 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948224
cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
CVE-2020-5310 https://nvd.nist.gov/vuln/detail/CVE-2020-5310
GHSA-vcqg-3p29-xw73 https://github.com/advisories/GHSA-vcqg-3p29-xw73
RHSA-2021:0420 https://access.redhat.com/errata/RHSA-2021:0420
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-5310.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-81.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/python-pillow/Pillow
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2020-5310
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-5310
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-5310
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Found at https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Found at https://usn.ubuntu.com/4272-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.68598
EPSS Score 0.00275
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.