CVE-2012-3444: Improper Restriction of Operations within the Bounds of a Memory Buffer
(updated )
The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.
References
- www.debian.org/security/2012/dsa-2529
- www.mandriva.com/security/advisories?name=MDVSA-2012:143
- www.openwall.com/lists/oss-security/2012/07/31/1
- www.openwall.com/lists/oss-security/2012/07/31/2
- www.ubuntu.com/usn/USN-1560-1
- github.com/advisories/GHSA-5h2q-4hrp-v9rr
- github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155
- github.com/django/django/commit/da33d67181b53fe6cc737ac1220153814a1509f6
- github.com/django/django/commit/dd16b17099b7d86f27773df048c5014cf439b282
- nvd.nist.gov/vuln/detail/CVE-2012-3444
- www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/
Detect and mitigate CVE-2012-3444 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →