{"uuid": "797ff2c4-0ca0-4318-8008-e57dd35061b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-3220", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4506", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-3220\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a defect in the CPython standard library module \u201cmimetypes\u201d where on Windows the default list of known file locations are writable meaning other users can create invalid files to cause MemoryError to be raised on Python runtime startup or have file extensions be interpreted as the incorrect file type.\n\nThis defect is caused by the default locations of Linux and macOS platforms (such as \u201c/etc/mime.types\u201d) also being used on Windows, where they are user-writable locations (\u201cC:\\etc\\mime.types\u201d).\n\nTo work-around this issue a user can call mimetypes.init() with an empty list (\u201c[]\u201d) on Windows platforms to avoid using the default list of known file locations.\n\ud83d\udccf Published: 2025-02-14T18:30:51Z\n\ud83d\udccf Modified: 2025-02-14T21:31:04Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-3220\n2. https://mail.python.org/archives/list/security-announce@python.org/thread/CDXW34ND2LSAOYAR5N6UNONP4ZBX4D6R\n3. http://www.openwall.com/lists/oss-security/2025/02/14/8", "creation_timestamp": "2025-02-14T22:11:08.000000Z"}