The library's failure to check if certain message types support a particular flag, the HDF5 1.8.16 library will cast the structure to an alternative structure and then assign to fields that aren't supported by the message type and the library will write outside the bounds of the heap buffer. This can lead to code execution under the context of the library.
References
Link | Resource |
---|---|
http://www.debian.org/security/2016/dsa-3727 | |
http://www.securityfocus.com/bid/94417 | |
http://www.talosintelligence.com/reports/TALOS-2016-0178/ | Exploit Technical Description Third Party Advisory |
https://security.gentoo.org/glsa/201701-13 | |
http://www.debian.org/security/2016/dsa-3727 | |
http://www.securityfocus.com/bid/94417 | |
http://www.talosintelligence.com/reports/TALOS-2016-0178/ | Exploit Technical Description Third Party Advisory |
https://security.gentoo.org/glsa/201701-13 |
Configurations
History
21 Nov 2024, 02:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2016/dsa-3727 - | |
References | () http://www.securityfocus.com/bid/94417 - | |
References | () http://www.talosintelligence.com/reports/TALOS-2016-0178/ - Exploit, Technical Description, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201701-13 - |
Information
Published : 2016-11-18 20:59
Updated : 2024-11-21 02:51
NVD link : CVE-2016-4332
Mitre link : CVE-2016-4332
CVE.ORG link : CVE-2016-4332
JSON object : View
Products Affected
hdfgroup
- hdf5
CWE
CWE-20
Improper Input Validation