Search for vulnerabilities
Vulnerability details: VCID-qs47-4gpq-aaas
Vulnerability ID VCID-qs47-4gpq-aaas
Aliases BIT-2021-34552
BIT-pillow-2021-34552
CVE-2021-34552
GHSA-7534-mm45-c74v
PYSEC-2021-331
Summary Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2021:3917
rhas Moderate https://access.redhat.com/errata/RHSA-2021:4149
cvssv3 5.9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34552.json
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00235 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00319 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00468 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00468 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00468 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00468 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00587 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00587 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00587 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00587 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.00674 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
epss 0.01183 https://api.first.org/data/v1/epss?cve=CVE-2021-34552
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1982378
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-7534-mm45-c74v
cvssv3.1 9.8 https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-331.yaml
generic_textual CRITICAL https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-331.yaml
cvssv3.1 6.7 https://github.com/python-pillow/Pillow
generic_textual MODERATE https://github.com/python-pillow/Pillow
cvssv3.1 9.8 https://github.com/python-pillow/Pillow/commit/31c473898c29d1b7cb6555ce67d9503a4906b83f
generic_textual CRITICAL https://github.com/python-pillow/Pillow/commit/31c473898c29d1b7cb6555ce67d9503a4906b83f
cvssv3.1 9.8 https://github.com/python-pillow/Pillow/pull/5567
generic_textual CRITICAL https://github.com/python-pillow/Pillow/pull/5567
cvssv3.1 9.8 https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
generic_textual CRITICAL https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2021-34552
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2021-34552
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2021-34552
cvssv3.1 9.8 https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
generic_textual CRITICAL https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
cvssv3.1 9.8 https://pillow.readthedocs.io/en/stable/releasenotes/index.html
generic_textual CRITICAL https://pillow.readthedocs.io/en/stable/releasenotes/index.html
archlinux Medium https://security.archlinux.org/AVG-2150
cvssv3.1 7.5 https://security.gentoo.org/glsa/202211-10
generic_textual HIGH https://security.gentoo.org/glsa/202211-10
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34552.json
https://api.first.org/data/v1/epss?cve=CVE-2021-34552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34552
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-331.yaml
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/31c473898c29d1b7cb6555ce67d9503a4906b83f
https://github.com/python-pillow/Pillow/pull/5567
https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/
https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
https://pillow.readthedocs.io/en/stable/releasenotes/index.html
https://security.gentoo.org/glsa/202211-10
1982378 https://bugzilla.redhat.com/show_bug.cgi?id=1982378
991293 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991293
ASA-202107-26 https://security.archlinux.org/ASA-202107-26
AVG-2150 https://security.archlinux.org/AVG-2150
cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
CVE-2021-34552 https://nvd.nist.gov/vuln/detail/CVE-2021-34552
GHSA-7534-mm45-c74v https://github.com/advisories/GHSA-7534-mm45-c74v
RHSA-2021:3917 https://access.redhat.com/errata/RHSA-2021:3917
RHSA-2021:4149 https://access.redhat.com/errata/RHSA-2021:4149
USN-5227-1 https://usn.ubuntu.com/5227-1/
USN-5227-2 https://usn.ubuntu.com/5227-2/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34552.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-331.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/python-pillow/Pillow
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/python-pillow/Pillow/commit/31c473898c29d1b7cb6555ce67d9503a4906b83f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/python-pillow/Pillow/pull/5567
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2021-34552
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-34552
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-34552
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://pillow.readthedocs.io/en/stable/releasenotes/index.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.gentoo.org/glsa/202211-10
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.43462
EPSS Score 0.00235
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.