CVE-2016-4332Improper Input Validation in Hdf5

Severity
8.6HIGHNVD
EPSS
0.1%
top 70.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 18
Latest updateMay 17

Description

The library's failure to check if certain message types support a particular flag, the HDF5 1.8.16 library will cast the structure to an alternative structure and then assign to fields that aren't supported by the message type and the library will write outside the bounds of the heap buffer. This can lead to code execution under the context of the library.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:HExploitability: 1.8 | Impact: 6.0

Affected Packages3 packages

debiandebian/hdf5< hdf5 1.10.0-patch1+docs-1 (bookworm)
Debianhdfgroup/hdf5< 1.10.0-patch1+docs-1+3
NVDhdfgroup/hdf51.8.16

🔴Vulnerability Details

2
GHSA
GHSA-349c-4hpx-25pr: The library's failure to check if certain message types support a particular flag, the HDF5 12022-05-17
OSV
CVE-2016-4332: The library's failure to check if certain message types support a particular flag, the HDF5 12016-11-18

📋Vendor Advisories

2
Red Hat
hdf5: Shareable message type out-of-bounds write2016-11-15
Debian
CVE-2016-4332: hdf5 - The library's failure to check if certain message types support a particular fla...2016

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight: Multiple File Parsing Bugs in HDF5 File Library Patched2016-11-18
Talos
Vulnerability Spotlight: Multiple File Parsing Bugs in HDF5 File Library Patched2016-11-18

💬Community

3
Bugzilla
CVE-2016-4330 CVE-2016-4331 CVE-2016-4332 CVE-2016-4333 hdf5: various flaws [epel-all]2016-11-23
Bugzilla
CVE-2016-4330 CVE-2016-4331 CVE-2016-4332 CVE-2016-4333 hdf5: various flaws [fedora-all]2016-11-23
Bugzilla
CVE-2016-4332 hdf5: Shareable message type out-of-bounds write2016-11-23