CVE-2016-4330
Publication date 18 November 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
In the HDF5 1.8.16 library’s failure to check if the number of dimensions for an array read from the file is within the bounds of the space allocated for it, a heap-based buffer overflow will occur, potentially leading to arbitrary code execution.
From the Ubuntu Security Team
It was discovered that HDF5 incorrectly handled certain input files. An attacker could possibly use this issue to execute arbitrary code.
Status
Package | Ubuntu Release | Status |
---|---|---|
hdf5 | 18.04 LTS bionic |
Not affected
|
16.04 LTS xenial |
Fixed 1.8.16+docs-4ubuntu1.1
|
|
14.04 LTS trusty |
Fixed 1.8.11-5ubuntu7.1
|
|
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |