Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4330

Опубликовано: 18 нояб. 2016
Источник: debian
EPSS Низкий

Описание

In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
hdf5fixed1.10.0-patch1+docs-1package

Примечания

  • http://www.talosintelligence.com/reports/TALOS-2016-0176/

  • Fixed by: https://bitbucket.hdfgroup.org/projects/HDFFV/repos/hdf5/commits/2e7e1899d3d7131bcbad65233ba713f6b79e2d69

EPSS

Процентиль: 63%
0.00442
Низкий

Связанные уязвимости

CVSS3: 8.6
ubuntu
около 9 лет назад

In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.

CVSS3: 8.6
redhat
около 9 лет назад

In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.

CVSS3: 8.6
nvd
около 9 лет назад

In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.

CVSS3: 8.6
github
больше 3 лет назад

In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.

EPSS

Процентиль: 63%
0.00442
Низкий