CVE-2012-3443
Published: 31 July 2012
The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.
Notes
Author | Note |
---|---|
mdeslaur | possible regression, see LP: #1031733 |
Priority
Status
Package | Release | Status |
---|---|---|
python-django Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Released
(1.1.1-2ubuntu1.5)
|
|
natty |
Released
(1.2.5-1ubuntu1.2)
|
|
oneiric |
Released
(1.3-2ubuntu1.3)
|
|
precise |
Released
(1.3.1-4ubuntu1.2)
|
|
upstream |
Released
(1.3.2,1.4.1)
|
|
Patches: vendor: http://www.debian.org/security/2012/dsa-2529 upstream: https://github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155 |
References
- https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/
- http://www.openwall.com/lists/oss-security/2012/07/31/1
- http://www.openwall.com/lists/oss-security/2012/07/31/2
- https://ubuntu.com/security/notices/USN-1560-1
- https://www.cve.org/CVERecord?id=CVE-2012-3443
- NVD
- Launchpad
- Debian