CVE-2012-3444: Django vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer
(updated )
The get_image_dimensions
function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.
References
- github.com/advisories/GHSA-5h2q-4hrp-v9rr
- github.com/django/django
- github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155
- github.com/django/django/commit/b2eb4787a0fff9c9993b78be5c698e85108f3446
- github.com/django/django/commit/c14f325c4eef628bc7bfd8873c3a72aeb0219141
- github.com/django/django/commit/da33d67181b53fe6cc737ac1220153814a1509f6
- github.com/django/django/commit/dd16b17099b7d86f27773df048c5014cf439b282
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2012-4.yaml
- nvd.nist.gov/vuln/detail/CVE-2012-3444
- www.djangoproject.com/weblog/2012/jul/30/security-releases-issued
Detect and mitigate CVE-2012-3444 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →