There is a defect in the CPython standard library module “mimetypes” where on Windows the default list of known file locations are writable meaning other users can create invalid files to cause MemoryError to be raised on Python runtime startup or have file extensions be interpreted as the incorrect file type. This defect is caused by the default locations of Linux and macOS platforms (such as “/etc/mime.types”) also being used on Windows, where they are user-writable locations (“C:\etc\mime.types”). To work-around this issue a user can call mimetypes.init() with an empty list (“[]”) on Windows platforms to avoid using the default list of known file locations.
History

Fri, 14 Mar 2025 10:45:00 +0000

Type Values Removed Values Added
References

Sat, 15 Feb 2025 01:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L'}

threat_severity

Low


Fri, 14 Feb 2025 19:45:00 +0000

Type Values Removed Values Added
References

Fri, 14 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 14 Feb 2025 16:30:00 +0000

Type Values Removed Values Added
Description There is a defect in the CPython standard library module “mimetypes” where on Windows the default list of known file locations are writable meaning other users can create invalid files to cause MemoryError to be raised on Python runtime startup or have file extensions be interpreted as the incorrect file type. This defect is caused by the default locations of Linux and macOS platforms (such as “/etc/mime.types”) also being used on Windows, where they are user-writable locations (“C:\etc\mime.types”). To work-around this issue a user can call mimetypes.init() with an empty list (“[]”) on Windows platforms to avoid using the default list of known file locations.
Title Default mimetype known files writeable on Windows
Weaknesses CWE-426
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PSF

Published: 2025-02-14T16:18:00.918Z

Updated: 2025-03-14T10:03:04.669Z

Reserved: 2024-04-02T18:08:09.733Z

Link: CVE-2024-3220

cve-icon Vulnrichment

Updated: 2025-03-14T10:03:04.669Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-02-14T17:15:15.567

Modified: 2025-03-14T10:15:14.917

Link: CVE-2024-3220

cve-icon Redhat

Severity : Low

Publid Date: 2025-02-14T16:18:00Z

Links: CVE-2024-3220 - Bugzilla