Page 6 of 26 results (0.009 seconds)

CVSS: 5.0EPSS: 2%CPEs: 29EXPL: 0

The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image. La función get_image_dimensions en la funcionalidad image-handling en Django anteriores a v1.3.2 y v1.4.x anteriores a v1.4.1 un tamaño de trozo constante en todos los intentos por determinar las dimensiones, lo que permitiría a atacantes remotos a provocar una denegación de servicio (consumo del proceso o hilo) a través de una imagen TIFF grande. • http://www.debian.org/security/2012/dsa-2529 http://www.mandriva.com/security/advisories?name=MDVSA-2012:143 http://www.openwall.com/lists/oss-security/2012/07/31/1 http://www.openwall.com/lists/oss-security/2012/07/31/2 http://www.ubuntu.com/usn/USN-1560-1 https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •