vulnerability

FreeBSD: VID-53252879-cf11-11e5-805c-5453ed2e2b49 (CVE-2016-0740): py-pillow -- Buffer overflow in TIFF decoding code

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Feb 9, 2016
Added
Dec 10, 2025
Modified
Dec 10, 2025

Description

The Pillow maintainers report: Pillow 3.1.0 and earlier when linked against libtiff >= 4.0.0 on x64 may overflow a buffer when reading a specially crafted tiff file. Specifically, libtiff >= 4.0.0 changed the return type of TIFFScanlineSize from int32 to machine dependent int32|64. If the scanline is sized so that it overflows an int32, it may be interpreted as a negative number, which will then pass the size check in TiffDecode.c line 236. To do this, the logical scanline size has to be > 2gb, and for the test file, the allocated buffer size is 64k against a roughly 4gb scan line size. Any image data over 64k is written over the heap, causing a segfault. This issue was found by security researcher FourOne.

Solutions

freebsd-upgrade-package-py27-pillowfreebsd-upgrade-package-py33-pillowfreebsd-upgrade-package-py34-pillowfreebsd-upgrade-package-py35-pillow
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.