Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-4330

Опубликовано: 18 нояб. 2016
Источник: ubuntu
Приоритет: medium
CVSS2: 6.9
CVSS3: 8.6

Описание

In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

1.10.0-patch1+docs-1~exp5
devel

not-affected

1.10.0-patch1+docs-1~exp5
esm-apps/bionic

not-affected

1.10.0-patch1+docs-1~exp5
esm-apps/xenial

released

1.8.16+docs-4ubuntu1.1
esm-infra-legacy/trusty

released

1.8.11-5ubuntu7.1
precise

ignored

end of life
precise/esm

DNE

precise was needs-triage
trusty

released

1.8.11-5ubuntu7.1
trusty/esm

released

1.8.11-5ubuntu7.1

Показывать по

6.9 Medium

CVSS2

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
redhat
около 9 лет назад

In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.

CVSS3: 8.6
nvd
около 9 лет назад

In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.

CVSS3: 8.6
debian
около 9 лет назад

In the HDF5 1.8.16 library's failure to check if the number of dimensi ...

CVSS3: 8.6
github
больше 3 лет назад

In the HDF5 1.8.16 library's failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.

6.9 Medium

CVSS2

8.6 High

CVSS3